CVE-2025-1979

medium

Description

Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password. This is only exploitable if: 1) Logging is enabled; 2) Redis is using password authentication; 3) Those logs are accessible to an attacker, who can reach that redis instance. **Note:** It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.

References

https://security.snyk.io/vuln/SNYK-PYTHON-RAY-8745212

https://github.com/ray-project/ray/pull/50409

https://github.com/ray-project/ray/issues/50266

https://github.com/ray-project/ray/commit/64a2e4010522d60b90c389634f24df77b603d85d

Details

Source: Mitre, NVD

Published: 2025-03-06

Updated: 2025-03-06

Risk Information

CVSS v2

Base Score: 4.5

Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.4

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N

Severity: Medium

CVSS v4

Base Score: 5.7

Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N

Severity: Medium

EPSS

EPSS: 0.00017