Vulnerabilities > CVE-2022-0543 - Missing Authorization vulnerability in Redis
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 2 | |
OS | 3 |
Common Weakness Enumeration (CWE)
Related news
- Muhstik Botnet Targeting Redis Servers Using Recently Disclosed Vulnerability (source)
- Unpatched Redis servers targeted in new Redigo malware attacks (source)
- New Redigo malware drops stealthy backdoor on Redis servers (source)
- Hackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on Servers (source)
- Hackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on Servers (source)
- New P2PInfect Worm Targeting Redis Servers on Linux and Windows Systems (source)
- New P2PInfect worm malware targets Linux and Windows Redis servers (source)
- P2PInfect server botnet spreads using Redis replication feature (source)
- Stealthier version of P2Pinfect malware targets MIPS devices (source)
References
- https://bugs.debian.org/1005787
- https://www.debian.org/security/2022/dsa-5081
- https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce
- https://lists.debian.org/debian-security-announce/2022/msg00048.html
- https://security.netapp.com/advisory/ntap-20220331-0004/
- http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html