Skip to content

Commit 2452fd5

Browse files
committed
automatic module_metadata_base.json update
1 parent ec5892f commit 2452fd5

File tree

1 file changed

+194
-0
lines changed

1 file changed

+194
-0
lines changed

db/modules_metadata_base.json

Lines changed: 194 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25763,6 +25763,69 @@
2576325763

2576425764
]
2576525765
},
25766+
"auxiliary_gather/ray_lfi_cve_2023_6020": {
25767+
"name": "Ray static arbitrary file read",
25768+
"fullname": "auxiliary/gather/ray_lfi_cve_2023_6020",
25769+
"aliases": [
25770+
25771+
],
25772+
"rank": 300,
25773+
"disclosure_date": "2023-11-15",
25774+
"type": "auxiliary",
25775+
"author": [
25776+
"byt3bl33d3r <[email protected]>",
25777+
"danmcinerney <[email protected]>",
25778+
"Takahiro Yokoyama"
25779+
],
25780+
"description": "Ray before 2.8.1 is vulnerable to a local file inclusion.",
25781+
"references": [
25782+
"CVE-2023-6020",
25783+
"URL-https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6/",
25784+
"URL-https://github.com/protectai/ai-exploits/tree/main/ray"
25785+
],
25786+
"platform": "",
25787+
"arch": "",
25788+
"rport": 8265,
25789+
"autofilter_ports": [
25790+
80,
25791+
8080,
25792+
443,
25793+
8000,
25794+
8888,
25795+
8880,
25796+
8008,
25797+
3000,
25798+
8443
25799+
],
25800+
"autofilter_services": [
25801+
"http",
25802+
"https"
25803+
],
25804+
"targets": null,
25805+
"mod_time": "2024-08-20 08:15:16 +0000",
25806+
"path": "/modules/auxiliary/gather/ray_lfi_cve_2023_6020.rb",
25807+
"is_install_path": true,
25808+
"ref_name": "gather/ray_lfi_cve_2023_6020",
25809+
"check": true,
25810+
"post_auth": false,
25811+
"default_credential": false,
25812+
"notes": {
25813+
"Stability": [
25814+
"crash-safe"
25815+
],
25816+
"SideEffects": [
25817+
"ioc-in-logs"
25818+
],
25819+
"Reliability": [
25820+
25821+
]
25822+
},
25823+
"session_types": false,
25824+
"needs_cleanup": false,
25825+
"actions": [
25826+
25827+
]
25828+
},
2576625829
"auxiliary_gather/redis_extractor": {
2576725830
"name": "Redis Extractor",
2576825831
"fullname": "auxiliary/gather/redis_extractor",
@@ -79984,6 +80047,137 @@
7998480047
"session_types": false,
7998580048
"needs_cleanup": true
7998680049
},
80050+
"exploit_linux/http/ray_agent_job_rce": {
80051+
"name": "Ray Agent Job RCE",
80052+
"fullname": "exploit/linux/http/ray_agent_job_rce",
80053+
"aliases": [
80054+
80055+
],
80056+
"rank": 600,
80057+
"disclosure_date": "2023-11-15",
80058+
"type": "exploit",
80059+
"author": [
80060+
"sierrabearchell",
80061+
"byt3bl33d3r <[email protected]>",
80062+
"Takahiro Yokoyama"
80063+
],
80064+
"description": "RCE in Ray via the agent job submission endpoint.\n This is intended functionality as Ray's main purpose is executing arbitrary workloads.\n By default Ray has no authentication.",
80065+
"references": [
80066+
"CVE-2023-48022",
80067+
"URL-https://huntr.com/bounties/b507a6a0-c61a-4508-9101-fceb572b0385/",
80068+
"URL-https://huntr.com/bounties/787a07c0-5535-469f-8c53-3efa4e5717c7/"
80069+
],
80070+
"platform": "Linux",
80071+
"arch": "",
80072+
"rport": 8265,
80073+
"autofilter_ports": [
80074+
80,
80075+
8080,
80076+
443,
80077+
8000,
80078+
8888,
80079+
8880,
80080+
8008,
80081+
3000,
80082+
8443
80083+
],
80084+
"autofilter_services": [
80085+
"http",
80086+
"https"
80087+
],
80088+
"targets": [
80089+
"Linux x64",
80090+
"Linux x86",
80091+
"Linux aarch64",
80092+
"Linux Command"
80093+
],
80094+
"mod_time": "2024-08-21 21:38:37 +0000",
80095+
"path": "/modules/exploits/linux/http/ray_agent_job_rce.rb",
80096+
"is_install_path": true,
80097+
"ref_name": "linux/http/ray_agent_job_rce",
80098+
"check": true,
80099+
"post_auth": false,
80100+
"default_credential": false,
80101+
"notes": {
80102+
"Stability": [
80103+
"crash-safe"
80104+
],
80105+
"SideEffects": [
80106+
"artifacts-on-disk",
80107+
"ioc-in-logs"
80108+
],
80109+
"Reliability": [
80110+
"repeatable-session"
80111+
]
80112+
},
80113+
"session_types": false,
80114+
"needs_cleanup": null
80115+
},
80116+
"exploit_linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019": {
80117+
"name": "Ray cpu_profile command injection",
80118+
"fullname": "exploit/linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019",
80119+
"aliases": [
80120+
80121+
],
80122+
"rank": 600,
80123+
"disclosure_date": "2023-11-15",
80124+
"type": "exploit",
80125+
"author": [
80126+
"sierrabearchell",
80127+
"byt3bl33d3r <[email protected]>",
80128+
"Takahiro Yokoyama"
80129+
],
80130+
"description": "Ray RCE via cpu_profile command injection vulnerability.",
80131+
"references": [
80132+
"CVE-2023-6019",
80133+
"URL-https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe/"
80134+
],
80135+
"platform": "Linux",
80136+
"arch": "",
80137+
"rport": 8265,
80138+
"autofilter_ports": [
80139+
80,
80140+
8080,
80141+
443,
80142+
8000,
80143+
8888,
80144+
8880,
80145+
8008,
80146+
3000,
80147+
8443
80148+
],
80149+
"autofilter_services": [
80150+
"http",
80151+
"https"
80152+
],
80153+
"targets": [
80154+
"Linux x64",
80155+
"Linux x86",
80156+
"Linux aarch64",
80157+
"Linux Command"
80158+
],
80159+
"mod_time": "2024-08-21 22:32:53 +0000",
80160+
"path": "/modules/exploits/linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019.rb",
80161+
"is_install_path": true,
80162+
"ref_name": "linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019",
80163+
"check": true,
80164+
"post_auth": false,
80165+
"default_credential": false,
80166+
"notes": {
80167+
"Stability": [
80168+
"crash-safe"
80169+
],
80170+
"SideEffects": [
80171+
"artifacts-on-disk",
80172+
"ioc-in-logs"
80173+
],
80174+
"Reliability": [
80175+
"repeatable-session"
80176+
]
80177+
},
80178+
"session_types": false,
80179+
"needs_cleanup": null
80180+
},
7998780181
"exploit_linux/http/rconfig_ajaxarchivefiles_rce": {
7998880182
"name": "Rconfig 3.x Chained Remote Code Execution",
7998980183
"fullname": "exploit/linux/http/rconfig_ajaxarchivefiles_rce",

0 commit comments

Comments
 (0)