Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行 | https://github.com/aodsec/CVE-2022-0543 | POC Details |
| 2 | Redis 沙盒逃逸(CVE-2022-0543)POC&EXP | https://github.com/z92g/CVE-2022-0543 | POC Details |
| 3 | Redis RCE through Lua Sandbox Escape vulnerability | https://github.com/JacobEbben/CVE-2022-0543 | POC Details |
| 4 | redis未授权、redis_CVE-2022-0543检测利用二合一脚本 | https://github.com/SiennaSkies/redisHack | POC Details |
| 5 | CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行 | https://github.com/0x7eTeam/CVE-2022-0543 | POC Details |
| 6 | This template exploits CVE-2022-0543, a Lua-based Redis sandbox escape. The vulnerability was introduced by Debian and Ubuntu Redis packages that insufficiently sanitized the Lua environment. The maintainers failed to disable the package interface, allowing attackers to load arbitrary libraries. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2022/CVE-2022-0543.yaml | POC Details |
| 7 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%95%B0%E6%8D%AE%E5%BA%93%E6%BC%8F%E6%B4%9E/Redis%20Lua%20%E6%B2%99%E7%9B%92%E7%BB%95%E8%BF%87%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%20CVE-2022-0543.md | POC Details |
| 8 | https://github.com/vulhub/vulhub/blob/master/redis/CVE-2022-0543/README.md | POC Details | |
| 9 | CVE-2022-0543 - Redis RCE Vulnerability home lab for Red Teaming, Penetration Testing Training with just one DOCKER | https://github.com/netw0rk7/CVE-2022-0543-Home-Lab | POC Details |
No public POC found.
Login to generate AI POCNo comments yet