It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://bugs.debian.org/1005787 | issue tracking third party advisory patch |
https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce | third party advisory |
https://lists.debian.org/debian-security-announce/2022/msg00048.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5081 | mailing list third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20220331-0004/ | third party advisory |
http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html | exploit vdb entry third party advisory |