# Lua库命令可能导致整数溢出和RCE
## 概述
Redis 是一个开源的内存数据库,支持将数据持久化到磁盘。在 Lua 脚本功能中存在一个安全漏洞。
## 影响版本
Redis 8.2.1 及以下版本。
## 细节
该漏洞允许经过身份验证的用户通过构造特殊的 Lua 脚本,触发整数溢出,可能导致远程代码执行。
## 影响
攻击者可利用此漏洞在目标系统上执行任意代码,造成潜在的安全风险。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2025-46817 – Redis Lua unpack Integer Overflow (Potential RCE) | https://github.com/dwisiswant0/CVE-2025-46817 | POC详情 |
| 2 | Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2025/CVE-2025-46817.yaml | POC详情 |
| 3 | None | https://github.com/slayerkkkk/CVE-2025-46817-PoC | POC详情 |
标题: Lua library commands may lead to integer overflow and potential RCE · Advisory · redis/redis · GitHub -- 🔗来源链接
标签: x_refsource_CONFIRM
神龙速读标题: Lua script may lead to integer overflow and potential RCE (CVE-2025-4… · redis/redis@fc9abc7 · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读暂无评论