Логотип exploitDog
bind:CVE-2025-1979
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-1979

Количество 3

Количество 3

redhat логотип

CVE-2025-1979

10 месяцев назад

Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if: 1) Logging is enabled; 2) Redis is using password authentication; 3) Those logs are accessible to an attacker, who can reach that redis instance. **Note:** It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2025-1979

10 месяцев назад

Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if: 1) Logging is enabled; 2) Redis is using password authentication; 3) Those logs are accessible to an attacker, who can reach that redis instance. **Note:** It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.

CVSS3: 6.4
EPSS: Низкий
github логотип

GHSA-w4rh-fgx7-q63m

10 месяцев назад

ray vulnerable to Insertion of Sensitive Information into Log File

CVSS3: 6.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-1979

Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if: 1) Logging is enabled; 2) Redis is using password authentication; 3) Those logs are accessible to an attacker, who can reach that redis instance. **Note:** It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.

CVSS3: 6.4
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2025-1979

Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if: 1) Logging is enabled; 2) Redis is using password authentication; 3) Those logs are accessible to an attacker, who can reach that redis instance. **Note:** It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.

CVSS3: 6.4
0%
Низкий
10 месяцев назад
github логотип
GHSA-w4rh-fgx7-q63m

ray vulnerable to Insertion of Sensitive Information into Log File

CVSS3: 6.4
0%
Низкий
10 месяцев назад

Уязвимостей на страницу