A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
Published 2023-11-16 17:15:09
Updated 2023-12-06 21:15:08
Source huntr.dev
View at NVD,   CVE.org

Products affected by CVE-2023-6019

Exploit prediction scoring system (EPSS) score for CVE-2023-6019

94.22%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2023-6019

  • Ray cpu_profile command injection
    Disclosure Date: 2023-11-15
    First seen: 2024-08-23
    exploit/linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019
    Ray RCE via cpu_profile command injection vulnerability. Authors: - sierrabearchell - byt3bl33d3r <marcello@protectai.com> - Takahiro Yokoyama

CVSS scores for CVE-2023-6019

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
10.0
CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
3.9
6.0
huntr.dev
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
huntr.dev
9.1
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
3.9
5.2
huntr.dev

CWE ids for CVE-2023-6019

References for CVE-2023-6019

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!