#VU107989 Deserialization of Untrusted Data in redisson - CVE-2023-42809

 

#VU107989 Deserialization of Untrusted Data in redisson - CVE-2023-42809

Published: April 28, 2025


Vulnerability identifier: #VU107989
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2023-42809
CWE-ID: CWE-502
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
redisson
Software vendor:
redisson

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to some of the messages received from the Redis server contain Java objects that the client deserializes without further validation. A remote attacker can manage to trick clients into communicating with a malicious server to include especially crafted objects in its responses that, once deserialized by the client, force it to execute arbitrary code. This can be abused to take control of the machine the client is running in.


Remediation

Install updates from vendor's website.

External links