Lucene search

K
cvelist@huntr_aiCVELIST:CVE-2023-6021
HistoryNov 16, 2023 - 4:11 p.m.

CVE-2023-6021 Ray Log File Local File Include

2023-11-1616:11:42
CWE-29
@huntr_ai
www.cve.org
4
lfi
ray
log file
server
security vulnerability
authentication

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

8.3

Confidence

High

EPSS

0.919

Percentile

99.0%

LFI in Ray’s log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers’ response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ray-project/ray",
    "vendor": "ray-project",
    "versions": [
      {
        "lessThanOrEqual": "latest",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

8.3

Confidence

High

EPSS

0.919

Percentile

99.0%