logo

CVE-2023-6021 ray

Package

Manager: pip
Name: ray
Vulnerable Version: >=0 <2.8.1

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.86375 pctl0.99369

Details

Ray Path Traversal vulnerability LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

Metadata

Created: 2023-11-16T18:30:31Z
Modified: 2025-01-09T23:39:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-3pww-qvr8-6mhp/GHSA-3pww-qvr8-6mhp.json
CWE IDs: ["CWE-22", "CWE-29"]
Alternative ID: GHSA-3pww-qvr8-6mhp
Finding: F063
Auto approve: 1