cve/2023/CVE-2023-6020.md

18 lines
666 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-6020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6020)
![](https://img.shields.io/static/v1?label=Product&message=ray-project%2Fray&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen)
### Description
LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.
### POC
#### Reference
- https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/nomi-sec/PoC-in-GitHub
2024-05-25 21:48:12 +02:00