Categories: Cyber Security News

PoC Released for Critical Lua Engine Vulnerabilities

A recent security audit of Redis 7.4.5 uncovered three severe flaws in the embedded Lua interpreter.

CVE-2025-49844 and CVE-2025-46817 permit remote code execution via a use-after-free in the parser and an integer overflow in the unpack() API.

CVE-2025-46818 allows attackers to escalate privileges by modifying basic type metatables. PoC exploits demonstrate real-world impact, confirming that unpatched instances are highly vulnerable.

CVE Details Table

CVE Identifier Description Location Impact CVSS 3.1 Score
CVE-2025-49844 Use-after-free in Lua parser deps/lua/src/lparser.c:387 Remote code execution 9.8
CVE-2025-46817 Integer overflow in unpack() deps/lua/src/lbaselib.c Stack corruption → RCE 9.8
CVE-2025-46818 Metatable privilege escalation src/script_lua.c, src/eval.c Privilege escalation 8.2

CVE-2025-49844 arises in the luaY_parser function where TString Objects are created but not protected on the Lua stack.

When garbage collection triggers during parsing, dangling references lead to memory corruption.

The patched version pushes the new TString onto the stack to prevent premature collection.

CVE-2025-46817 affects the unpack() base library function. It computes element counts n = e - i + 1 without bounds checking.

Crafted arguments produce integer overflows that corrupt the Lua VM stack, enabling arbitrary code execution when the overflowed size governs memory operations.

CVE-2025-46818 exploits the fact that core type metatables for strings, numbers, booleans, and nil are mutable by default.

An attacker executing an untrusted script via EVAL can replace metamethods in these tables, injecting code that executes in other users’ contexts or escalates privileges.

The fix marks these core metatables as read-only, causing modification attempts to be rejected.

Sponsored

A comprehensive Python PoC includes tests for all three issues.

It stresses the Lua VM with extreme memory pressure to trigger the parser UAF, crafts unpack() calls with out-of-range bounds to detect overflow, and attempts metatable modifications for each basic type.

Successful exploit attempts crash or subvert the server, while patched servers reject dangerous operations.

The discovery of these vulnerabilities underscores the risks inherent in embedding scripting engines without rigorous sandboxing and memory safety checks.

Remote code execution and privilege escalation exploits are publicly available and fully functional against Redis 7.4.5.

Administrators should upgrade to the patched versions containing the commits 5785f3e6e, d5728cb57, 72be22dff, and 61e56c1a7 or later.

Until patches are applied, disabling the Lua engine or restricting EVAL access is strongly recommended to mitigate the critical attack surface.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA’s Diamond Membership: Join Today

The post PoC Released for Critical Lua Engine Vulnerabilities appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Mother urges lawmakers to support Harlem early childhood education funding

MACHESNEY PARK, Ill. (WTVO) — As the Harlem School District grapples with fixing a budget…

2 hours ago

Two charged with first-degree murder in a 2021 Rockford shooting

Two men have been charged with first-degree murder in connection with a 2021 deadly shooting…

3 hours ago

One of Grammarly’s ‘experts’ is suing the company over its identity-stealing AI feature

Journalist Julia Angwin is one of the writers whose likeness was used in Grammarly’s “expert…

5 hours ago

Trump administration asks Supreme Court to revoke legal protections for Haitians

The U.S. Supreme Court on Oct. 9, 2024. (Photo by Jane Norman/States Newsroom)WASHINGTON — The…

5 hours ago

iPhone Fold rumor: iPad-like multitasking, but no iPad apps and no Face ID

The folding iPhone might come with an inner display the size of an iPad Mini,…

6 hours ago

Some of the best horror games ever made are included in Humble’s latest $15 bundle

Humble has teamed up with Frictional Games for a new bundle of PC games that…

6 hours ago

This website uses cookies.