Description
Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.
References (13)
Core 13
Core References
Third Party Advisory x_refsource_confirm
https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411
Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162146.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/06/04/8
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/06/04/12
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2015-10/msg00014.html
Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162094.html
Third Party Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2015-1676.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/75034
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/06/05/3
Exploit, Third Party Advisory x_refsource_misc
http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2015/dsa-3279
Mailing List x_refsource_confirm
https://groups.google.com/forum/#%21msg/redis-db/4Y6OqK8gEyk/Dg-5cejl-eUJ
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201702-16
Scores
EPSS
0.0813
EPSS Percentile
92.2%
Details
CWE
CWE-17
Status
published
Products (5)
debian/debian_linux
8.0
debian/debian_linux
9.0
redislabs/redis
3.0.0
redislabs/redis
3.0.1
redislabs/redis
< 2.8.20
Published
Jun 09, 2015
Tracked Since
Feb 18, 2026