CVE-2023-6021: Ray Path Traversal vulnerability
(updated )
LFI in Ray’s log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
References
- github.com/advisories/GHSA-3pww-qvr8-6mhp
- github.com/ray-project/ray
- github.com/ray-project/ray/releases/tag/ray-2.8.1
- huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8
- nvd.nist.gov/vuln/detail/CVE-2023-6021
- www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
Detect and mitigate CVE-2023-6021 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →