First published: Thu Nov 16 2023(Updated: )
A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
Credit: security@huntr.dev security@huntr.dev Fire_Wolf
Affected Software | Affected Version | How to fix |
---|---|---|
Ray Project Ray | ||
pip/ray | <=2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-6019 is a vulnerability that allows remote attackers to execute arbitrary commands on the system running the Ray dashboard.
CVE-2023-6019 is classified as critical with a severity value of 10.
The affected software for CVE-2023-6019 is Ray Project Ray.
To fix the CVE-2023-6019 vulnerability, it is recommended to update to a patched version of Ray.
You can find more information about CVE-2023-6019 at the following link: https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe