QID 730240

Date Published: 2021-11-18

QID 730240: Redis Server Arbitrary File Read Vulnerability

Redis is an open source, in-memory database that persists on disk.

When using the Redis Lua Debugger, users can send malformed requests that cause the debugger's protocol parser to read data beyond the actual buffer.

Affected Versions:
Redis Server versions prior to 3.2 or newer.

Patched Versions:
Redis Server versions 6.2.6, 6.0.16 and 5.0.14

QID Detection Logic (Remote):
This QID tries to authenticate with the default credential of redis server then sends a "info" to get the version.

Successful exploitation of this vulnerability may allow an attacker to read arbitrary files from the target system.

  • CVSS V3 rated as Medium - 4.3 severity.
  • CVSS V2 rated as Medium - 4 severity.
  • Solution
    Customers are advised to update to the latest patch version of Redis Server. For more information, Please refer to Redis Security Advisory

    Vendor References

    CVEs related to QID 730240

    Software Advisories
    Advisory ID Software Component Link
    Redis Security Advisory URL Logo github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm