cve/2023/CVE-2023-6020.md
2024-06-18 02:51:15 +02:00

18 lines
666 B
Markdown

### [CVE-2023-6020](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6020)
![](https://img.shields.io/static/v1?label=Product&message=ray-project%2Fray&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%3D%20latest%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen)
### Description
LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.
### POC
#### Reference
- https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub