Description
A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h3xg-wv58-5p43 | Ray OS Command Injection vulnerability |
References
History
Fri, 08 Aug 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat openshift Ai |
|
| CPEs | cpe:/a:redhat:openshift_ai:2.22::el9 | |
| Vendors & Products |
Redhat
Redhat openshift Ai |
|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-02T08:21:17.025Z
Reserved: 2023-11-08T09:12:47.118Z
Link: CVE-2023-6019
No data.
Status : Modified
Published: 2023-11-16T17:15:08.830
Modified: 2024-11-21T08:42:59.533
Link: CVE-2023-6019
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA