CVE-2023-6019.yaml
1 info: 2 name: ray 3 cve: CVE-2023-6019 4 summary: Ray OS 命令注入漏洞 5 details: Ray 的 cpu_profile URL 参数存在命令注入漏洞,允许攻击者在未经认证的情况下远程执行系统命令。 6 cvss: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7 severity: CRITICAL 8 security_advise: 升级到 ray >= 2.8.1 版本以修复此漏洞。 9 rule: version < "2.8.1" 10 references: 11 - https://nvd.nist.gov/vuln/detail/CVE-2023-6019 12 - https://github.com/ray-project/ray 13 - https://github.com/ray-project/ray/releases/tag/ray-2.8.1 14 - https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe 15 - https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023