QID 730240
Date Published: 2021-11-18
QID 730240: Redis Server Arbitrary File Read Vulnerability
Redis is an open source, in-memory database that persists on disk.
When using the Redis Lua Debugger, users can send malformed requests that cause the debugger's protocol parser to read data beyond the actual buffer.
Affected Versions:
Redis Server versions prior to 3.2 or newer.
Patched Versions:
Redis Server versions 6.2.6, 6.0.16 and 5.0.14
QID Detection Logic (Remote):
This QID tries to authenticate with the default credential of redis server then sends a "info" to get the version.
Successful exploitation of this vulnerability may allow an attacker to read arbitrary files from the target system.
Solution
Customers are advised to update to the latest patch version of Redis Server. For more information, Please refer to Redis Security Advisory
Vendor References
- Redis Security Advisory -
github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm
CVEs related to QID 730240
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Redis Security Advisory |
|