Skip to content

Commit

Permalink
Improve CVE2023-6019 description.
Browse files Browse the repository at this point in the history
PiperOrigin-RevId: 618827725
Change-Id: I196eb96b52202e385c462d5a208916b3bd8538f0
  • Loading branch information
vsutedjo authored and copybara-github committed Mar 25, 2024
1 parent db00d42 commit 5bbb3f6
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 6 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -154,9 +154,9 @@ private DetectionReport buildDetectionReport(
.addRelatedId(
VulnerabilityId.newBuilder().setPublisher("CVE").setValue("CVE-2023-6019"))
.setDescription(
"An attacker can use the model upload functionality to load remote Linux"
+ " commands and gains code execution on the server hosting the ray"
+ " application.")
"A command injection exists in Ray's cpu_profile URL parameter allowing"
+ " attackers to execute os commands on the system running the ray"
+ " dashboard remotely without authentication.")
.setRecommendation("Upgrade Ray to version 2.8.0. or later."))
.build();
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,9 +66,9 @@ public final class Cve20236019DetectorTest {
.setTitle("CVE-2023-6019")
.addRelatedId(VulnerabilityId.newBuilder().setPublisher("CVE").setValue("CVE-2023-6019"))
.setDescription(
"An attacker can use the model upload functionality to load remote"
+ " Linux commands and gains code execution on the server hosting"
+ " the ray application.")
"A command injection exists in Ray's cpu_profile URL parameter allowing"
+ " attackers to execute os commands on the system running the ray"
+ " dashboard remotely without authentication.")
.setRecommendation("Upgrade Ray to version 2.8.0. or later.")
.build();
private MockWebServer mockWebServer;
Expand Down

0 comments on commit 5bbb3f6

Please sign in to comment.