Vulnerability Description
LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ray Project | Ray | - |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8Exploit
- https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8Exploit
FAQ
What is CVE-2023-6021?
CVE-2023-6021 is a vulnerability with a CVSS score of 7.5 (HIGH). LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.any...
How severe is CVE-2023-6021?
CVE-2023-6021 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6021?
Check the references section above for vendor advisories and patch information. Affected products include: Ray Project Ray.