{"containers":{"cna":{"affected":[{"product":"redis","vendor":"Debian","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2022-02-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution."}],"problemTypes":[{"descriptions":[{"description":"Lua sandbox escape","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-04-27T20:06:10.000Z","orgId":"79363d38-fa19-49d1-9214-5f28da3f3ac5","shortName":"debian"},"references":[{"tags":["x_refsource_MISC"],"url":"https://bugs.debian.org/1005787"},{"tags":["x_refsource_MISC"],"url":"https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce"},{"name":"[debian-security-announce] 20220218 [SECURITY] [DSA 5081-1] redis security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-security-announce/2022/msg00048.html"},{"name":"DSA-5081","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2022/dsa-5081"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20220331-0004/"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html"}],"source":{"advisory":"DSA-5081-1","discovery":"EXTERNAL"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@debian.org","DATE_PUBLIC":"2022-02-18T00:00:00.000Z","ID":"CVE-2022-0543","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"redis","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"Debian"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Lua sandbox escape"}]}]},"references":{"reference_data":[{"name":"https://bugs.debian.org/1005787","refsource":"MISC","url":"https://bugs.debian.org/1005787"},{"name":"https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce","refsource":"MISC","url":"https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce"},{"name":"[debian-security-announce] 20220218 [SECURITY] [DSA 5081-1] redis security update","refsource":"MLIST","url":"https://lists.debian.org/debian-security-announce/2022/msg00048.html"},{"name":"DSA-5081","refsource":"DEBIAN","url":"https://www.debian.org/security/2022/dsa-5081"},{"name":"https://security.netapp.com/advisory/ntap-20220331-0004/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20220331-0004/"},{"name":"http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html"}]},"source":{"advisory":"DSA-5081-1","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:32:46.290Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugs.debian.org/1005787"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce"},{"name":"[debian-security-announce] 20220218 [SECURITY] [DSA 5081-1] redis security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-security-announce/2022/msg00048.html"},{"name":"DSA-5081","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5081"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20220331-0004/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html"}]},{"metrics":[{"cvssV3_1":{"scope":"CHANGED","version":"3.1","baseScore":10,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2022-0543","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-01-29T20:49:14.266148Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-03-28","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-0543"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-0543","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-862","description":"CWE-862 Missing Authorization"}]}],"timeline":[{"time":"2022-03-28T00:00:00.000Z","lang":"en","value":"CVE-2022-0543 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:15:45.813Z"}}]},"cveMetadata":{"assignerOrgId":"79363d38-fa19-49d1-9214-5f28da3f3ac5","assignerShortName":"debian","cveId":"CVE-2022-0543","datePublished":"2022-02-18T19:25:16.932Z","dateReserved":"2022-02-08T00:00:00.000Z","dateUpdated":"2025-10-21T23:15:45.813Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}