Bug 2417394 (CVE-2025-62593) - CVE-2025-62593 ray: Ray is vulnerable to RCE via Safari & Firefox Browsers through DNS Rebinding Attack
Summary: CVE-2025-62593 ray: Ray is vulnerable to RCE via Safari & Firefox Browsers th...
Keywords:
Status: NEW
Alias: CVE-2025-62593
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-11-26 23:01 UTC by OSIDB Bzimport
Modified: 2025-12-01 06:06 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-11-26 23:01:49 UTC
Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against browser-based attacks, as the current defense uses the User-Agent header starting with the string "Mozilla" as a defense mechanism. This defense is insufficient as the fetch specification allows the User-Agent header to be modified. Combined with a DNS rebinding attack against the browser, and this vulnerability is exploitable against a developer running Ray who inadvertently visits a malicious website, or is served a malicious advertisement (malvertising). This issue has been patched in version 2.52.0.


Note You need to log in before you can comment on or make changes to this bug.