Skip to content

Commit 52852ce

Browse files
committed
Add cve ref
1 parent 99c81d7 commit 52852ce

File tree

2 files changed

+4
-2
lines changed

2 files changed

+4
-2
lines changed

documentation/modules/exploit/linux/http/ray_agent_job_rce.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Vulnerable Application
22

3-
Ray (<=v2.6.3) is vulnerable to RCE via the agent job submission endpoint
3+
Ray (<=v2.6.3) is vulnerable to RCE via the agent job submission endpoint (CVE-2023-48022)
44

55
The vulnerability affects:
66

modules/exploits/linux/http/ray_agent_job_rce.rb

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ def initialize(info = {})
2727
],
2828
'License' => MSF_LICENSE,
2929
'References' => [
30+
['CVE', '2023-48022'],
3031
['URL', 'https://huntr.com/bounties/b507a6a0-c61a-4508-9101-fceb572b0385/'],
3132
['URL', 'https://huntr.com/bounties/787a07c0-5535-469f-8c53-3efa4e5717c7/']
3233
],
@@ -41,7 +42,8 @@ def initialize(info = {})
4142
[ 'Linux aarch64', { 'Arch' => ARCH_AARCH64, 'Platform' => 'linux' } ],
4243
[
4344
'Linux Command', {
44-
'Arch' => [ ARCH_CMD ], 'Platform' => [ 'unix', 'linux' ], 'Type' => :nix_cmd, 'DefaultOptions' => {
45+
'Arch' => [ ARCH_CMD ], 'Platform' => [ 'unix', 'linux' ], 'Type' => :nix_cmd,
46+
'DefaultOptions' => {
4547
'PAYLOAD' => 'cmd/linux/http/x64/meterpreter_reverse_tcp',
4648
'FETCH_COMMAND' => 'WGET'
4749
}

0 commit comments

Comments
 (0)