Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-6019 PoC — Ray Command Injection in cpu_profile Parameter

Source
Associated Vulnerability
Title:Ray Command Injection in cpu_profile Parameter (CVE-2023-6019)
Description:A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
Description
Python POC for CVE-2023-6019 taken from https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe
Readme
<h1>Python POC Derived from <a href="https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe">Authors POC</a></h1>

<h5>Usage</h5>
<code>python3 CVE-2023-6019.py -t 192.168.191.37 -p 9000 -l 192.168.45.xxx -lp 4444</code>
File Snapshot

[4.0K] /data/pocs/e6773ed59c7f0cbe8c25f4343f22bf5aad278b42 ├── [1.1K] CVE-2023-6019.py └── [ 230] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →