Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-1979

Опубликовано: 06 мар. 2025
Источник: redhat
CVSS3: 6.4

Описание

Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if:

  1. Logging is enabled;
  2. Redis is using password authentication;
  3. Those logs are accessible to an attacker, who can reach that redis instance. Note: It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.

    A flaw was found in the ray package. Versions of the package ray before 2.43.0 are vulnerable to the insertion of sensitive information into the log file where the Redis password is being logged in the standard logging. If the Redis password is passed as an argument, it will be logged, and the password could be leaked. This is only exploitable if logging is enabled, Redis is using password authentication, and the logs are accessible to an attacker who can access that Redis instance.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux AI (RHEL AI)ui-rhel9Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-532
https://bugzilla.redhat.com/show_bug.cgi?id=2350231ray: Insertion of Sensitive Information into Log File

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.4
nvd
10 месяцев назад

Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if: 1) Logging is enabled; 2) Redis is using password authentication; 3) Those logs are accessible to an attacker, who can reach that redis instance. **Note:** It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.

CVSS3: 6.4
github
10 месяцев назад

ray vulnerable to Insertion of Sensitive Information into Log File

6.4 Medium

CVSS3