### [CVE-2023-6021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6021) ![](https://img.shields.io/static/v1?label=Product&message=ray-project%2Fray&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-29%20Path%20Traversal%3A%20'%5C..%5Cfilename'&color=brighgreen) ### Description LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 ### POC #### Reference - https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8 #### Github - https://github.com/nomi-sec/PoC-in-GitHub