### [CVE-2023-6020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6020) ![](https://img.shields.io/static/v1?label=Product&message=ray-project%2Fray&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen) ### Description LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication. ### POC #### Reference - https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6 #### Github - https://github.com/nomi-sec/PoC-in-GitHub