Vulnerability Description
A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ray Project | Ray | - |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfeExploit
- https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfeExploit
FAQ
What is CVE-2023-6019?
CVE-2023-6019 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in ...
How severe is CVE-2023-6019?
CVE-2023-6019 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-6019?
Check the references section above for vendor advisories and patch information. Affected products include: Ray Project Ray.