CVE-2025-1979

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-1979
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-1979.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-1979
Aliases
Published
2025-03-06T05:15:16Z
Modified
2025-04-09T17:59:29.358107Z
Summary
[none]
Details

Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password.

This is only exploitable if:

1) Logging is enabled;

2) Redis is using password authentication;

3) Those logs are accessible to an attacker, who can reach that redis instance.

Note:

It is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password.

References

Affected packages

Git / github.com/ray-project/ray

Affected ranges

Type
GIT
Repo
https://github.com/ray-project/ray
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

ray-0.*

ray-0.1.0
ray-0.1.1
ray-0.1.2
ray-0.2.0
ray-0.2.1
ray-0.2.2
ray-0.3.0
ray-0.3.1
ray-0.4.0
ray-0.5.0
ray-0.5.1
ray-0.5.2
ray-0.5.3
ray-0.6.0
ray-0.6.1
ray-0.6.2
ray-0.6.3
ray-0.6.4
ray-0.6.5
ray-0.7.0