POC详情: 6d832ca12e1051bcdf34a0c1142b03b078935b85

来源
关联漏洞
标题: Redis 资源管理错误漏洞 (CVE-2025-49844)
描述:Redis是美国Redis公司的一套开源的使用ANSI C编写、支持网络、可基于内存亦可持久化的日志型、键值(Key-Value)存储数据库,并提供多种语言的API。 Redis 8.2.1及之前版本存在资源管理错误漏洞,该漏洞源于特制Lua脚本可操纵垃圾收集器,触发释放后重用,可能导致远程代码执行。
描述
A powerful Redis exploitation tool that leverages CVE-2025-4984
介绍
# CVE-2025-49844 - Redis Lua Interpreter Exploit

![yuri08loveelaina](https://img.shields.io/badge/Author-yuri08loveelaina-red)
![Version](https://img.shields.io/badge/Version-1.0-blue)
![License](https://img.shields.io/badge/License-MIT-green)

A powerful Redis exploitation tool that leverages CVE-2025-49844 vulnerability to bypass all security protections and gain unauthorized access to Redis servers.

## Features

- Bypass all security mechanisms (ASLR, DEP, StackGuard, NXBit, PIE)
- Exploit Use-After-Free vulnerability in Redis Lua interpreter
- Execute arbitrary shellcode on target systems
- Establish persistent backdoor access
- Stealth operation with minimal detection footprint

## Requirements

- Python 3.6+
- Redis server with vulnerable version
- Required Python packages:
  ```
  pip install redis colorama
  ```

## Installation

```bash
git clone https://github.com/Yuri08loveElaina/CVE-2025-49844.git
cd CVE-2025-49844
pip install -r requirements.txt
chmod +x redis_exploit.py
```

## Usage

```bash
./redis_exploit.py -H <target_host> -p <port> [-a <password>] [-m <mode>]
```

### Options

- `-H, --host`: Target Redis host (default: localhost)
- `-p, --port`: Target Redis port (default: 6379)
- `-a, --auth`: Redis password (if required)
- `-m, --mode`: Exploit mode (default: all)
  - `check`: Check if target is vulnerable
  - `bypass`: Bypass security protections
  - `uaf`: Trigger UAF vulnerability
  - `shellcode`: Execute shellcode
  - `persist`: Establish persistence
  - `all`: Run all exploits sequentially

### Examples

```bash
# Basic exploitation
./redis_exploit.py -H 192.168.1.100

# With authentication
./redis_exploit.py -H 192.168.1.100 -p 6380 -a mypassword

# Run specific exploit only
./redis_exploit.py -H 192.168.1.100 -m shellcode
```

## Vulnerable Versions

- Redis 7.2.x before 7.2.11
- Redis 7.4.x before 7.4.6
- Redis 8.0.x before 8.0.4
- Redis 8.2.x before 8.2.2

## Detection

This tool is designed to be stealthy and avoid detection. However, some indicators may include:

- Unusual Lua script execution patterns
- Memory allocation anomalies
- Unexpected garbage collection cycles

## Disclaimer

This tool is for educational and authorized testing purposes only. The authors are not responsible for any misuse or damage caused by this tool. Use only on systems you own or have explicit permission to test.

## License

This project is licensed under the MIT License - see the LICENSE file for details.
文件快照

[4.0K] /data/pocs/6d832ca12e1051bcdf34a0c1142b03b078935b85 ├── [1.0K] LICENSE ├── [2.4K] README.md ├── [9.7K] redis_exploit.py └── [ 29] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。