{"id":"CVE-2015-4335","details":"Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.","modified":"2026-04-16T06:24:22.335755271Z","published":"2015-06-09T14:59:07Z","references":[{"type":"ADVISORY","url":"http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162094.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162146.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2015-10/msg00014.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1676.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3279"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2015/06/04/12"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2015/06/04/8"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2015/06/05/3"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/75034"},{"type":"ADVISORY","url":"https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-16"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/06/04/12"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/06/04/8"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/06/05/3"},{"type":"EVIDENCE","url":"http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/"},{"type":"WEB","url":"https://groups.google.com/forum/#%21msg/redis-db/4Y6OqK8gEyk/Dg-5cejl-eUJ"}],"schema_version":"1.7.5"}