cve/2023/CVE-2023-6021.md

18 lines
884 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-6021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6021)
![](https://img.shields.io/static/v1?label=Product&message=ray-project%2Fray&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-29%20Path%20Traversal%3A%20'%5C..%5Cfilename'&color=brighgreen)
### Description
LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
### POC
#### Reference
- https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/nomi-sec/PoC-in-GitHub
2024-05-25 21:48:12 +02:00