Lucene search

K
githubexploit64553943-36E8-5F23-8D93-0E2CBC276057
HistoryMar 29, 2024 - 9:54 a.m.

Exploit for Server-Side Request Forgery in Anyscale Ray

2024-03-2909:54:31
113
anyscale ray
server-side request forgery
remote command execution
vulnerability
python framework
ai
machine learning
security challenge
vulnerability
remote attacker
arbitrary code
risk
software framework
security protocols
ai projects
ml projects
metasploit module
defensive techniques
responsible use.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

Low

EPSS

0.717

Percentile

98.1%

PoC for a remote command execution vulnerability in Ray framew…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

Low

EPSS

0.717

Percentile

98.1%