|
25763 | 25763 |
|
25764 | 25764 | ]
|
25765 | 25765 | },
|
| 25766 | + "auxiliary_gather/ray_lfi_cve_2023_6020": { |
| 25767 | + "name": "Ray static arbitrary file read", |
| 25768 | + "fullname": "auxiliary/gather/ray_lfi_cve_2023_6020", |
| 25769 | + "aliases": [ |
| 25770 | + |
| 25771 | + ], |
| 25772 | + "rank": 300, |
| 25773 | + "disclosure_date": "2023-11-15", |
| 25774 | + "type": "auxiliary", |
| 25775 | + "author": [ |
| 25776 | + "byt3bl33d3r < [email protected]>", |
| 25777 | + "danmcinerney < [email protected]>", |
| 25778 | + "Takahiro Yokoyama" |
| 25779 | + ], |
| 25780 | + "description": "Ray before 2.8.1 is vulnerable to a local file inclusion.", |
| 25781 | + "references": [ |
| 25782 | + "CVE-2023-6020", |
| 25783 | + "URL-https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6/", |
| 25784 | + "URL-https://github.com/protectai/ai-exploits/tree/main/ray" |
| 25785 | + ], |
| 25786 | + "platform": "", |
| 25787 | + "arch": "", |
| 25788 | + "rport": 8265, |
| 25789 | + "autofilter_ports": [ |
| 25790 | + 80, |
| 25791 | + 8080, |
| 25792 | + 443, |
| 25793 | + 8000, |
| 25794 | + 8888, |
| 25795 | + 8880, |
| 25796 | + 8008, |
| 25797 | + 3000, |
| 25798 | + 8443 |
| 25799 | + ], |
| 25800 | + "autofilter_services": [ |
| 25801 | + "http", |
| 25802 | + "https" |
| 25803 | + ], |
| 25804 | + "targets": null, |
| 25805 | + "mod_time": "2024-08-20 08:15:16 +0000", |
| 25806 | + "path": "/modules/auxiliary/gather/ray_lfi_cve_2023_6020.rb", |
| 25807 | + "is_install_path": true, |
| 25808 | + "ref_name": "gather/ray_lfi_cve_2023_6020", |
| 25809 | + "check": true, |
| 25810 | + "post_auth": false, |
| 25811 | + "default_credential": false, |
| 25812 | + "notes": { |
| 25813 | + "Stability": [ |
| 25814 | + "crash-safe" |
| 25815 | + ], |
| 25816 | + "SideEffects": [ |
| 25817 | + "ioc-in-logs" |
| 25818 | + ], |
| 25819 | + "Reliability": [ |
| 25820 | + |
| 25821 | + ] |
| 25822 | + }, |
| 25823 | + "session_types": false, |
| 25824 | + "needs_cleanup": false, |
| 25825 | + "actions": [ |
| 25826 | + |
| 25827 | + ] |
| 25828 | + }, |
25766 | 25829 | "auxiliary_gather/redis_extractor": {
|
25767 | 25830 | "name": "Redis Extractor",
|
25768 | 25831 | "fullname": "auxiliary/gather/redis_extractor",
|
@@ -79984,6 +80047,137 @@
|
79984 | 80047 | "session_types": false,
|
79985 | 80048 | "needs_cleanup": true
|
79986 | 80049 | },
|
| 80050 | + "exploit_linux/http/ray_agent_job_rce": { |
| 80051 | + "name": "Ray Agent Job RCE", |
| 80052 | + "fullname": "exploit/linux/http/ray_agent_job_rce", |
| 80053 | + "aliases": [ |
| 80054 | + |
| 80055 | + ], |
| 80056 | + "rank": 600, |
| 80057 | + "disclosure_date": "2023-11-15", |
| 80058 | + "type": "exploit", |
| 80059 | + "author": [ |
| 80060 | + "sierrabearchell", |
| 80061 | + "byt3bl33d3r < [email protected]>", |
| 80062 | + "Takahiro Yokoyama" |
| 80063 | + ], |
| 80064 | + "description": "RCE in Ray via the agent job submission endpoint.\n This is intended functionality as Ray's main purpose is executing arbitrary workloads.\n By default Ray has no authentication.", |
| 80065 | + "references": [ |
| 80066 | + "CVE-2023-48022", |
| 80067 | + "URL-https://huntr.com/bounties/b507a6a0-c61a-4508-9101-fceb572b0385/", |
| 80068 | + "URL-https://huntr.com/bounties/787a07c0-5535-469f-8c53-3efa4e5717c7/" |
| 80069 | + ], |
| 80070 | + "platform": "Linux", |
| 80071 | + "arch": "", |
| 80072 | + "rport": 8265, |
| 80073 | + "autofilter_ports": [ |
| 80074 | + 80, |
| 80075 | + 8080, |
| 80076 | + 443, |
| 80077 | + 8000, |
| 80078 | + 8888, |
| 80079 | + 8880, |
| 80080 | + 8008, |
| 80081 | + 3000, |
| 80082 | + 8443 |
| 80083 | + ], |
| 80084 | + "autofilter_services": [ |
| 80085 | + "http", |
| 80086 | + "https" |
| 80087 | + ], |
| 80088 | + "targets": [ |
| 80089 | + "Linux x64", |
| 80090 | + "Linux x86", |
| 80091 | + "Linux aarch64", |
| 80092 | + "Linux Command" |
| 80093 | + ], |
| 80094 | + "mod_time": "2024-08-21 21:38:37 +0000", |
| 80095 | + "path": "/modules/exploits/linux/http/ray_agent_job_rce.rb", |
| 80096 | + "is_install_path": true, |
| 80097 | + "ref_name": "linux/http/ray_agent_job_rce", |
| 80098 | + "check": true, |
| 80099 | + "post_auth": false, |
| 80100 | + "default_credential": false, |
| 80101 | + "notes": { |
| 80102 | + "Stability": [ |
| 80103 | + "crash-safe" |
| 80104 | + ], |
| 80105 | + "SideEffects": [ |
| 80106 | + "artifacts-on-disk", |
| 80107 | + "ioc-in-logs" |
| 80108 | + ], |
| 80109 | + "Reliability": [ |
| 80110 | + "repeatable-session" |
| 80111 | + ] |
| 80112 | + }, |
| 80113 | + "session_types": false, |
| 80114 | + "needs_cleanup": null |
| 80115 | + }, |
| 80116 | + "exploit_linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019": { |
| 80117 | + "name": "Ray cpu_profile command injection", |
| 80118 | + "fullname": "exploit/linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019", |
| 80119 | + "aliases": [ |
| 80120 | + |
| 80121 | + ], |
| 80122 | + "rank": 600, |
| 80123 | + "disclosure_date": "2023-11-15", |
| 80124 | + "type": "exploit", |
| 80125 | + "author": [ |
| 80126 | + "sierrabearchell", |
| 80127 | + "byt3bl33d3r < [email protected]>", |
| 80128 | + "Takahiro Yokoyama" |
| 80129 | + ], |
| 80130 | + "description": "Ray RCE via cpu_profile command injection vulnerability.", |
| 80131 | + "references": [ |
| 80132 | + "CVE-2023-6019", |
| 80133 | + "URL-https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe/" |
| 80134 | + ], |
| 80135 | + "platform": "Linux", |
| 80136 | + "arch": "", |
| 80137 | + "rport": 8265, |
| 80138 | + "autofilter_ports": [ |
| 80139 | + 80, |
| 80140 | + 8080, |
| 80141 | + 443, |
| 80142 | + 8000, |
| 80143 | + 8888, |
| 80144 | + 8880, |
| 80145 | + 8008, |
| 80146 | + 3000, |
| 80147 | + 8443 |
| 80148 | + ], |
| 80149 | + "autofilter_services": [ |
| 80150 | + "http", |
| 80151 | + "https" |
| 80152 | + ], |
| 80153 | + "targets": [ |
| 80154 | + "Linux x64", |
| 80155 | + "Linux x86", |
| 80156 | + "Linux aarch64", |
| 80157 | + "Linux Command" |
| 80158 | + ], |
| 80159 | + "mod_time": "2024-08-21 22:32:53 +0000", |
| 80160 | + "path": "/modules/exploits/linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019.rb", |
| 80161 | + "is_install_path": true, |
| 80162 | + "ref_name": "linux/http/ray_cpu_profile_cmd_injection_cve_2023_6019", |
| 80163 | + "check": true, |
| 80164 | + "post_auth": false, |
| 80165 | + "default_credential": false, |
| 80166 | + "notes": { |
| 80167 | + "Stability": [ |
| 80168 | + "crash-safe" |
| 80169 | + ], |
| 80170 | + "SideEffects": [ |
| 80171 | + "artifacts-on-disk", |
| 80172 | + "ioc-in-logs" |
| 80173 | + ], |
| 80174 | + "Reliability": [ |
| 80175 | + "repeatable-session" |
| 80176 | + ] |
| 80177 | + }, |
| 80178 | + "session_types": false, |
| 80179 | + "needs_cleanup": null |
| 80180 | + }, |
79987 | 80181 | "exploit_linux/http/rconfig_ajaxarchivefiles_rce": {
|
79988 | 80182 | "name": "Rconfig 3.x Chained Remote Code Execution",
|
79989 | 80183 | "fullname": "exploit/linux/http/rconfig_ajaxarchivefiles_rce",
|
|
0 commit comments