Описание
Ray OS Command Injection vulnerability
A command injection exists in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-6019
- https://github.com/ray-project/ray
- https://github.com/ray-project/ray/releases/tag/ray-2.8.1
- https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe
- https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
Пакеты
ray
< 2.8.1
2.8.1
Связанные уязвимости
A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
Уязвимость компонента dashboard фреймворка для масштабирования приложений AI и Python Ray, позволяющая нарушителю выполнить произвольные команды