CVE-2023-6021

LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
Configurations

Configuration 1 (hide)

cpe:2.3:a:ray_project:ray:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:42

Type Values Removed Values Added
References () https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8 - Exploit () https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8 - Exploit

06 Dec 2023, 21:15

Type Values Removed Values Added
Summary LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

06 Dec 2023, 20:15

Type Values Removed Values Added
Summary LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

29 Nov 2023, 10:15

Type Values Removed Values Added
Summary LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication.

24 Nov 2023, 23:05

Type Values Removed Values Added
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Ray Project
Ray Project ray
CPE cpe:2.3:a:ray_project:ray:-:*:*:*:*:*:*:*
References () https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8 - () https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8 - Exploit

16 Nov 2023, 17:30

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-16 17:15

Updated : 2024-11-21 08:42


NVD link : CVE-2023-6021

Mitre link : CVE-2023-6021

CVE.ORG link : CVE-2023-6021


JSON object : View

Products Affected

ray_project

  • ray
CWE
CWE-29

Path Traversal: '\..\filename'

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')