Lucene search

K
githubGitHub Advisory DatabaseGHSA-H3XG-WV58-5P43
HistoryNov 16, 2023 - 6:30 p.m.

Ray OS Command Injection vulnerability

2023-11-1618:30:31
CWE-78
GitHub Advisory Database
github.com
11
ray
command injection
vulnerability
remote execution
security
cpu profile

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.804

Percentile

98.3%

A command injection exists in Ray’s cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication.

Affected configurations

Vulners
Node
ray_projectrayRange2.6.3

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.804

Percentile

98.3%