Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2023-6019

Description

A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

POC

Reference

- https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe

Github

- https://github.com/20142995/nuclei-templates

- https://github.com/Clydeston/CVE-2023-6019

- https://github.com/EssenceCyber/Exploit-List

- https://github.com/FireWolfWang/CVE-2023-6019

- https://github.com/google/tsunami-security-scanner-plugins

- https://github.com/kikihayashi/Offsec_Proving_Grounds

- https://github.com/kikihayashi/Offsec_Proving_Grounds_test

- https://github.com/miguelc49/CVE-2023-6019-1

- https://github.com/miguelc49/CVE-2023-6019-2

- https://github.com/miguelc49/CVE-2023-6019-3

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/pika5164/Offsec_Proving_Grounds