A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
- https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe
- https://github.com/20142995/nuclei-templates
- https://github.com/Clydeston/CVE-2023-6019
- https://github.com/EssenceCyber/Exploit-List
- https://github.com/FireWolfWang/CVE-2023-6019
- https://github.com/google/tsunami-security-scanner-plugins
- https://github.com/kikihayashi/Offsec_Proving_Grounds
- https://github.com/kikihayashi/Offsec_Proving_Grounds_test
- https://github.com/miguelc49/CVE-2023-6019-1
- https://github.com/miguelc49/CVE-2023-6019-2
- https://github.com/miguelc49/CVE-2023-6019-3
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pika5164/Offsec_Proving_Grounds