Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-24735 : What You Need to Know

Learn about CVE-2022-24735 impacting Redis where Lua scripts manipulation allows bypassing ACL rules, potentially leading to unauthorized code execution and its mitigation.

Redis, an in-memory database that persists on disk, is vulnerable to exploitation via Lua script execution environment. This allows attackers to inject Lua code prior to version 7.0.0 or 6.2.7, potentially gaining higher privileges. Redis versions 7.0.0 and 6.2.7 address these issues.

Understanding CVE-2022-24735

This CVE affects Redis due to weaknesses in the Lua script execution environment, allowing for the injection of malicious Lua code to run with elevated privileges.

What is CVE-2022-24735?

Redis is impacted by a vulnerability where ACL rules can be bypassed by manipulating Lua scripts. This could lead to unauthorized code execution with heightened permissions.

The Impact of CVE-2022-24735

The security flaw in Redis allows less privileged users to inject Lua code that can be executed by privileged users, potentially compromising the integrity of the system.

Technical Details of CVE-2022-24735

The vulnerability arises from the Lua script execution environment in Redis, enabling attackers to bypass ACL rules and execute malicious code with elevated privileges.

Vulnerability Description

Exploiting Redis versions prior to 7.0.0 or 6.2.7, attackers can inject Lua code to run with higher privileges, circumventing ACL restrictions.

Affected Systems and Versions

Redis versions < 7.0.0 and >= 6.0.0, < 6.2.7 are susceptible to this security issue.

Exploitation Mechanism

By leveraging weaknesses in the Lua script execution environment, attackers can bypass ACL rules to execute unauthorized Lua code.

Mitigation and Prevention

To address CVE-2022-24735 in Redis, immediate action and long-term security practices are crucial.

Immediate Steps to Take

Update Redis servers to version 7.0.0 or 6.2.7 to mitigate the vulnerability. For environments not using Lua scripting, restrict access to

SCRIPT LOAD
and
EVAL
commands using ACL rules.

Long-Term Security Practices

Ensure regular security updates for Redis to protect against emerging vulnerabilities. Implement least privilege principles and monitor Redis configurations for unauthorized script executions.

Patching and Updates

Apply the latest patches released by Redis to fix CVE-2022-24735. Stay informed about security advisories and promptly update Redis installations to safeguard against potential exploits.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now