CVE-2024-46981 — Use After Free in Redis
Severity
9.8CRITICALNVD
OSV6.5
EPSS
75.7%
top 1.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 6
Latest updateMar 19
Description
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages13 packages
Also affects: Debian Linux 11.0
🔴Vulnerability Details
3📋Vendor Advisories
5Debian▶
CVE-2024-46981: redict - Redis is an open source, in-memory database that persists on disk. An authentica...↗2024