POC详情: 5d0d15d3e2a7551011d6a2d20000c6a7cb169d6e

来源
关联漏洞
标题: Redis 代码注入漏洞 (CVE-2025-46818)
描述:Redis是美国Redis公司的一套开源的使用ANSI C编写、支持网络、可基于内存亦可持久化的日志型、键值(Key-Value)存储数据库,并提供多种语言的API。 Redis 8.2.1及之前版本存在代码注入漏洞,该漏洞源于允许经过身份验证的用户使用特制Lua脚本操作不同LUA对象,可能导致在另一用户环境中运行任意代码。
描述
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
文件快照

id: CVE-2025-46818 info: name: Redis Lua Sandbox < 8.2.2 - Cross-User Escape author: pussycat0x ...
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。