漏洞描述 该漏洞该漏洞存在于Redis的Lua脚本执行模块中,拥有低权限及以上用户权限的攻击者可通过构造特殊的Lua脚本,操控垃圾回收机制,触发释放后重用(Use-After-Free)漏洞,从而可能导致远程代码执行。
相关漏洞推荐 Redis-commander /signin 默认口令漏洞 POC redis-commander-default-login: Redis Commander - Default Login Redis XACKDEL 缓冲区溢出漏洞 Redis Lua 脚本 代码执行漏洞(CVE-2025-49844) Redis Lua脚本 UAF漏洞 可导致远程代码执行 POC CVE-2022-0543: Redis Sandbox Escape - Remote Code Execution POC ec2-unrestricted-redis: Unrestricted Redis Access POC cache-redis-encryption-disabled: ElastiCache Redis In-Transit and At-Rest Encryption - Disabled POC cache-redis-multiaz-disabled: ElastiCache Redis Multi-AZ - Disabled POC azure-redis-nonssl-port-disabled: Azure Redis Cache In-Transit Encryption Not Enabled POC azure-redis-tls-version-outdated: Azure Redis Cache TLS Version Not Latest POC redis-unauthorized: Redis Unauthorized POC redis-config: Redis Configuration File - Detect