Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. ray
  4. ›
  5. CVE-2023-6019

CVE-2023-6019: Ray OS Command Injection vulnerability

November 16, 2023 (updated January 9, 2025)

A command injection exists in Ray’s cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication.

References

  • github.com/advisories/GHSA-h3xg-wv58-5p43
  • github.com/ray-project/ray
  • github.com/ray-project/ray/releases/tag/ray-2.8.1
  • huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe
  • nvd.nist.gov/vuln/detail/CVE-2023-6019
  • www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023

Code Behaviors & Features

Detect and mitigate CVE-2023-6019 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.8.1

Fixed versions

  • 2.8.1

Solution

Upgrade to version 2.8.1 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

pypi/ray/CVE-2023-6019.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:16 +0000.