CVE-2025-62593

CRITICAL
中文标题:
(暂无数据)
英文标题:
Ray is vulnerable to RCE via Safari & Firefox Browsers through DNS Rebinding Attack
CVSS分数: 9.4
发布时间: 2025-11-26 22:28:28
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v2
漏洞描述
中文描述:

(暂无数据)

英文描述:

Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against browser-based attacks, as the current defense uses the User-Agent header starting with the string "Mozilla" as a defense mechanism. This defense is insufficient as the fetch specification allows the User-Agent header to be modified. Combined with a DNS rebinding attack against the browser, and this vulnerability is exploitable against a developer running Ray who inadvertently visits a malicious website, or is served a malicious advertisement (malvertising). This issue has been patched in version 2.52.0.

CWE类型:
CWE-94 CWE-352
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
ray-project ray < 2.52.0 - - cpe:2.3:a:ray-project:ray:<_2.52.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/ray-project/ray/security/advisories/GHSA-q279-jhrf-cc6v x_refsource_CONFIRM
cve.org
访问
https://github.com/ray-project/ray/commit/70e7c72780bdec075dba6cad1afe0832772bfe09 x_refsource_MISC
cve.org
访问
CVSS评分详情
4.0 (cna)
CRITICAL
9.4
CVSS向量: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
机密性
HIGH
完整性
HIGH
可用性
HIGH
后续系统影响 (Subsequent):
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2025-11-26 22:28:28
修改时间:
2025-11-28 18:22:23
创建时间:
2026-01-12 02:12:13
更新时间:
2026-01-12 02:27:57
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-62593 2025-11-29 02:09:37 2026-01-12 02:12:13
NVD nvd_CVE-2025-62593 2025-12-02 03:00:02 2026-01-12 02:27:57
版本与语言
当前版本: v2
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v2 NVD
2026-01-12 02:27:57
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']