Specially crafted Lua script can trigger stack buffer overflow in Redis, leading to remote code execution
CVE-2024-31449
What is CVE-2024-31449?
CVE-2024-31449 is a critical vulnerability affecting Redis, an open-source in-memory database widely used for caching and real-time data storage. This vulnerability arises from the ability of authenticated users to execute specially crafted Lua scripts, which can trigger a stack buffer overflow in the Redis bit library. The resulting exploitation can lead to remote code execution, posing a severe risk to organizations that rely on Redis for their data management and application performance. If left unaddressed, this flaw could enable attackers to compromise the integrity and confidentiality of organizational data and systems.
Technical Details
The vulnerability is related to the Lua scripting capabilities integrated within Redis, which allow scripts to be executed in a secure environment. However, due to improper handling of certain conditions in the bit library, a specifically crafted Lua script can lead to a stack buffer overflow. This weakness can be exploited by authenticated users to execute arbitrary code on the server, ultimately granting them control over the affected Redis instance. The identified issue affects all versions of Redis that support Lua scripting, and there are no known workarounds available. Users are strongly encouraged to upgrade to the patched versions: 6.2.16, 7.2.6, or 7.4.1 to mitigate this vulnerability.
Potential impact of CVE-2024-31449
-
Remote Code Execution: The primary consequence of this vulnerability is the potential for remote code execution, allowing attackers to run arbitrary code on Redis servers. This can lead to unauthorized access, data manipulation, or complete system control, jeopardizing the security posture of organizations.
-
Data Integrity Compromise: Exploiting this vulnerability may result in unauthorized access to sensitive data stored in Redis, leading to data breaches. Attackers could modify, delete, or exfiltrate critical information, undermining the integrity of business operations.
-
Service Disruption: Successful exploitation of the stack buffer overflow could lead to server crashes or unavailability of the Redis service. This disruption could have a cascading effect on applications and services that depend on Redis, resulting in significant downtime or degradation of service quality.
Affected Version(s)
redis >= 2.6, < 6.2.16 < 2.6, 6.2.16
redis >= 7.0.0, < 7.2.6 < 7.0.0, 7.2.6
redis >= 7.3.0, < 7.4.1 < 7.3.0, 7.4.1
References
CVSS V3.1
Timeline
Vulnerability published