CVE-2024-25115
📋 TL;DR
This vulnerability in RedisBloom allows authenticated users to execute specially crafted CF.LOADCHUNK commands to trigger a heap overflow, potentially leading to remote code execution. It affects RedisBloom versions 2.0.0 through 2.4.6 and 2.6.0 through 2.6.9. Users running vulnerable RedisBloom modules with authenticated Redis access are at risk.
💻 Affected Systems
- RedisBloom module for Redis
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with the privileges of the Redis process, potentially leading to complete system compromise.
Likely Case
Service disruption through heap corruption crashes or limited code execution within Redis process context.
If Mitigated
Denial of service if heap overflow causes crashes but no code execution.
🎯 Exploit Status
Exploitation requires authentication to Redis (unless Redis is configured without authentication) and knowledge of crafting specific CF.LOADCHUNK commands. Heap overflow exploitation typically requires some skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.7 and 2.6.10
Vendor Advisory: https://github.com/RedisBloom/RedisBloom/security/advisories/GHSA-w583-p2wh-4vj5
Restart Required: Yes
Instructions:
1. Stop Redis service. 2. Update RedisBloom module to version 2.4.7 or 2.6.10. 3. Restart Redis service. 4. Verify the module version is updated.
🔧 Temporary Workarounds
Disable CF.LOADCHUNK command
allUse Redis command renaming to disable the vulnerable CF.LOADCHUNK command.
redis-cli CONFIG SET rename-command CF.LOADCHUNK ""
Restrict Redis authentication
allEnsure strong authentication is required for Redis access and limit user permissions.
redis-cli CONFIG SET requirepass "strong_password"
redis-cli CONFIG SET rename-command CF.LOADCHUNK ""
🧯 If You Can't Patch
- Disable the CF.LOADCHUNK command using Redis command renaming.
- Implement network segmentation to restrict access to Redis instances to only trusted sources.
🔍 How to Verify
Check if Vulnerable:
Check RedisBloom module version using Redis command: redis-cli MODULE LIST | grep -i bloom
Check Version:
redis-cli MODULE LIST | grep -i bloom
Verify Fix Applied:
Verify module version shows 2.4.7 or higher, or 2.6.10 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual CF.LOADCHUNK command usage patterns
- Redis process crashes or abnormal termination
Network Indicators:
- Network traffic containing CF.LOADCHUNK commands to Redis ports
SIEM Query:
source="redis.log" AND "CF.LOADCHUNK"
🔗 References
- https://github.com/RedisBloom/RedisBloom/commit/2f3b38394515fc6c9b130679bcd2435a796a49ad
- https://github.com/RedisBloom/RedisBloom/security/advisories/GHSA-w583-p2wh-4vj5
- https://github.com/RedisBloom/RedisBloom/commit/2f3b38394515fc6c9b130679bcd2435a796a49ad
- https://github.com/RedisBloom/RedisBloom/security/advisories/GHSA-w583-p2wh-4vj5