目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-49844 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Redis Lua Use-After-Free may lead to remote code execution
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
释放后使用
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Redis 资源管理错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Redis是美国Redis公司的一套开源的使用ANSI C编写、支持网络、可基于内存亦可持久化的日志型、键值(Key-Value)存储数据库,并提供多种语言的API。 Redis 8.2.1及之前版本存在资源管理错误漏洞,该漏洞源于特制Lua脚本可操纵垃圾收集器,触发释放后重用,可能导致远程代码执行。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
redisredis < 8.2.2 -
二、漏洞 CVE-2025-49844 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/gopinaath/CVE-2025-49844-discoveryPOC详情
2CVE-2025-49844 – Redis Lua Parser Use-After-Freehttps://github.com/dwisiswant0/CVE-2025-49844POC详情
3CVE-2025-49844 (RediShell)https://github.com/raminfp/redis_exploitPOC详情
4Nonehttps://github.com/lastvocher/redis-CVE-2025-49844POC详情
5Minimal Redis honeypot detecting RediShell (CVE-2025-49844) exploits.https://github.com/srozb/reditrapPOC详情
6Nonehttps://github.com/pedrorichil/CVE-2025-49844POC详情
7A powerful Redis exploitation tool that leverages CVE-2025-4984https://github.com/Yuri08loveElaina/CVE-2025-49844POC详情
8CVE-2025-49844 POC https://github.com/YuanBenSir/CVE-2025-49844_POCPOC详情
9CVE-2025-49844 checkerhttps://github.com/Mufti22/CVE-2025-49844-RediShell-Vulnerability-ScannerPOC详情
10Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2025/CVE-2025-49844.yamlPOC详情
11Nonehttps://github.com/imbas007/CVE-2025-49844-Vulnerability-ScannerPOC详情
12PoC of RediShellhttps://github.com/angelusrivera/CVE-2025-49844POC详情
13CVE-2025-49844 POC https://github.com/MiclelsonCN/CVE-2025-49844_POCPOC详情
14🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.https://github.com/ksnnd32/redis_exploitPOC详情
15🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.https://github.com/Zain3311/CVE-2025-49844POC详情
16اسکپلویت اسیب پذیری CVE-2025-49844https://github.com/elyasbassir/CVE-2025-49844POC详情
17CVE-2025-49844https://github.com/B1ack4sh/Blackash-CVE-2025-49844POC详情
18Proof-of-concept for CVE-2025-49844https://github.com/saneki/cve-2025-49844POC详情
19Untested completition of the Redishell PoC made by AIhttps://github.com/Network-Sec/CVE-2025-49844-RediShell-AI-made-RevshellPOC详情
20CVE-2025-49844https://github.com/Ashwesker/Blackash-CVE-2025-49844POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-49844 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-49844

暂无评论


发表评论