CVE-2022-0543

CRITICAL KEV NUCLEI LAB

Redis Lua Sandbox Escape

Title source: metasploit

Description

It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.

Exploits (9)

nomisec WORKING POC 95 stars
by 0x7eTeam · remote
https://github.com/0x7eTeam/CVE-2022-0543
nomisec WORKING POC 25 stars
by z92g · remote
https://github.com/z92g/CVE-2022-0543
nomisec WORKING POC 9 stars
by JacobEbben · remote
https://github.com/JacobEbben/CVE-2022-0543
nomisec WORKING POC 4 stars
by SiennaSkies · remote
https://github.com/SiennaSkies/redisHack
nomisec WORKING POC
by netw0rk7 · poc
https://github.com/netw0rk7/CVE-2022-0543-Home-Lab
nomisec WORKING POC
by abramas · poc
https://github.com/abramas/CVE-2022-0543
vulncheck_xdb WRITEUP
remote
https://github.com/vulhub/vulhub
metasploit WORKING POC EXCELLENT
by Reginaldo Silva, jbaines-r7 · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/redis/redis_debian_sandbox_escape.rb

Nuclei Templates (1)

Redis Sandbox Escape - Remote Code Execution
CRITICALby dwisiswant0
Shodan: redis_version || redis

Scores

CVSS v3 10.0
EPSS 0.9440
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull vulhub/1panel:1.10.10
docker pull vulhub/activemq:5.11.1
docker pull vulhub/activemq:5.11.1-with-cron
docker pull vulhub/activemq:5.17.3
docker pull vulhub/airflow:1.10.10
+355 more images
+5 more repos

Details

CISA KEV 2022-03-28
VulnCheck KEV 2022-03-24
InTheWild.io 2022-03-11
ENISA EUVD EUVD-2022-15665
CWE
CWE-862
Status published
Products (1)
redis/redis
Published Feb 18, 2022
KEV Added Mar 28, 2022
Tracked Since Feb 18, 2026