Site icon TheCyberThrone

Redis was affected by CVE-2024-51741 and CVE-2024-46981

Advertisements

CVE-2024-51741

Description:
This vulnerability affects Redis, an open-source in-memory data structure store used as a database, cache, and message broker. The issue arises when an authenticated user with sufficient privileges creates a malformed Access Control List (ACL) selector. When this malformed selector is accessed, it causes the Redis server to panic and crash, leading to a denial of service (DoS).

Technical Details:

Mitigation:

Severity: Medium (CVSS score: 4.4)

References:

Advertisements

CVE-2024-46981

Description:
This vulnerability also affects Redis. It involves the misuse of the Lua scripting functionality within Redis. An authenticated user can craft a specific Lua script that manipulates the garbage collector in a way that could lead to remote code execution (RCE). This allows an attacker to execute arbitrary code on the server, potentially leading to full system compromise.

Technical Details:

Mitigation:

Severity: High (CVSS score: 7.0)

References:

Advertisements

Conclusion

Both CVE-2024-51741 and CVE-2024-46981 highlight the importance of regularly updating software and applying security best practices. By keeping your Redis installations up to date and implementing strict access controls, you can mitigate the risks associated with these vulnerabilities.

Exit mobile version