CVE-2023-48022: Ray has arbitrary code execution via jobs submission API
(updated )
Anyscale Ray allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor’s position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment.
References
- atlas.mitre.org/studies/AML.CS0023
- bishopfox.com/blog/ray-versions-2-6-3-2-8-0
- console.vulncheck.com/cve/CVE-2023-48022
- docs.ray.io/en/latest/ray-security/index.html
- github.com/advisories/GHSA-6wgj-66m2-xxp2
- github.com/advisories/GHSA-xg2h-7cxj-3gvh
- github.com/honysyang/Ray
- github.com/ray-project/ray
- github.com/ray-project/ray/commit/978947083b1e192dba61ef653c863b11d56b0936
- nvd.nist.gov/vuln/detail/CVE-2023-48022
- www.anyscale.com/blog/update-on-ray-cve-2023-48022-new-verification-tooling-available
- www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild
- www.vicarius.io/vsociety/posts/shadowray-cve-2023-48022-exploit
- www.vulncheck.com/blog/initial-access-intelligence-august-2024
Code Behaviors & Features
Detect and mitigate CVE-2023-48022 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →