CVE-2023-6021
HIGH NUCLEIRay's log API - LFI
Title source: llmDescription
LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
Nuclei Templates (1)
Ray API - Local File Inclusion
HIGHVERIFIEDby byt3bl33d3r
Shodan:
html:"Ray Dashboard" || http.favicon.hash:463802404 || http.html:"ray dashboard"
FOFA:
body="ray dashboard" || icon_hash=463802404
Scores
CVSS v3
7.5
EPSS
0.8732
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-29
CWE-22
Status
published
Products (2)
pypi/ray
0 - 2.8.1PyPI
ray_project/ray
Published
Nov 16, 2023
Tracked Since
Feb 18, 2026