|
|||
Rule General Information |
---|
Release Date: | 2025-04-22 | |
Rule Name: | Ray Operating System Command Injection Vulnerability (CVE-2023-6019) | |
Severity: | Critical | |
CVE ID: | CVE-2023-6019 | |
Rule Protection Details |
---|
Description: | A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe |
|
Solutions |
---|
Please refer to announcements or patches release by the vendor: https://github.com/ray-project/ray/pull/39019 |