CVE-2023-6020

LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ray_project:ray:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:42

Type Values Removed Values Added
References () https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6 - Exploit () https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6 - Exploit

08 Feb 2024, 10:15

Type Values Removed Values Added
Summary LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.

06 Dec 2023, 21:15

Type Values Removed Values Added
Summary LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-... https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

06 Dec 2023, 20:15

Type Values Removed Values Added
Summary LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication. LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-... https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

29 Nov 2023, 10:15

Type Values Removed Values Added
Summary LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication. LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.

24 Nov 2023, 23:09

Type Values Removed Values Added
CPE cpe:2.3:a:ray_project:ray:-:*:*:*:*:*:*:*
First Time Ray Project
Ray Project ray
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-862
References () https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6 - () https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6 - Exploit

16 Nov 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-16 21:15

Updated : 2024-11-21 08:42


NVD link : CVE-2023-6020

Mitre link : CVE-2023-6020

CVE.ORG link : CVE-2023-6020


JSON object : View

Products Affected

ray_project

  • ray
CWE
CWE-862

Missing Authorization