diff --git a/google/detectors/rce/ai/cve202348022/src/main/java/com/google/tsunami/plugins/cve202348022/Cve202348022Detector.java b/google/detectors/rce/ai/cve202348022/src/main/java/com/google/tsunami/plugins/cve202348022/Cve202348022Detector.java index 411ed6ea0..88e5249b2 100644 --- a/google/detectors/rce/ai/cve202348022/src/main/java/com/google/tsunami/plugins/cve202348022/Cve202348022Detector.java +++ b/google/detectors/rce/ai/cve202348022/src/main/java/com/google/tsunami/plugins/cve202348022/Cve202348022Detector.java @@ -154,7 +154,7 @@ private DetectionReport buildDetectionReport( .setMainId( VulnerabilityId.newBuilder().setPublisher("GOOGLE").setValue("CVE-2023-48022")) .setSeverity(Severity.CRITICAL) - .setTitle("CVE-2023-48022") + .setTitle("CVE-2023-48022 Arbitrary Code Execution in Ray") .setDescription( "An attacker can use the job upload functionality to execute arbitrary code on" + " the server hosting the ray application.") diff --git a/google/detectors/rce/ai/cve202348022/src/test/java/com/google/tsunami/plugins/cve202348022/Cve202348022DetectorTest.java b/google/detectors/rce/ai/cve202348022/src/test/java/com/google/tsunami/plugins/cve202348022/Cve202348022DetectorTest.java index 30548b5f2..80288da45 100644 --- a/google/detectors/rce/ai/cve202348022/src/test/java/com/google/tsunami/plugins/cve202348022/Cve202348022DetectorTest.java +++ b/google/detectors/rce/ai/cve202348022/src/test/java/com/google/tsunami/plugins/cve202348022/Cve202348022DetectorTest.java @@ -122,7 +122,7 @@ public void detect_withCallbackServer_onVulnerableTarget_returnsVulnerability() .setPublisher("GOOGLE") .setValue("CVE-2023-48022")) .setSeverity(Severity.CRITICAL) - .setTitle("CVE-2023-48022")) + .setTitle("CVE-2023-48022 Arbitrary Code Execution in Ray")) .build()); }