PT-2023-8933 · Anyscale · Anyscale Ray
Jakaba01
·
Published
2023-08-28
·
Updated
2025-11-19
·
CVE-2023-48022
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Anyscale Ray versions 2.6.3 through 2.8.0
Description
The vulnerability is related to insufficient validation of incoming requests in the Anyscale Ray AI framework, allowing a remote attacker to execute arbitrary code via the job submission API. Thousands of publicly exposed Ray servers worldwide have been compromised due to this issue. The vulnerability has been exploited in real-world incidents, with attackers hijacking compute power and leaking data across sectors for 7 months. The estimated number of potentially affected devices worldwide is not explicitly stated, but it is mentioned that major tech companies such as Uber, Amazon, and OpenAI are affected.
Recommendations
For Anyscale Ray versions 2.6.3 through 2.8.0, consider disabling the job submission API until a patch is available. Restrict access to the vulnerable API endpoint to minimize the risk of exploitation. Avoid using the
job submission API endpoint until the issue is resolved. As a temporary workaround, consider implementing additional validation and authentication mechanisms for incoming requests to the job submission API. At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
RCE
DoS
SSRF
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2024-02669
CVE-2023-48022
GHSA-6WGJ-66M2-XXP2
Affected Products
Anyscale Ray
References · 82
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ray_agent_job_rce.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/jakabakos/ShadowRay-RCE-PoC-CVE-2023-48022⭐ 4 🔗 1 · Exploit
- 🔥 https://bishopfox.com/blog/ray-versions-2-6-3-2-8-0 · Exploit
- https://osv.dev/vulnerability/GHSA-6wgj-66m2-xxp2 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-48022 · Security Note
- https://osv.dev/vulnerability/CVE-2023-48022 · Vendor Advisory
- https://bdu.fstec.ru/vul/2024-02669 · Security Note
- https://github.com/ray-project/ray⭐ 39160 🔗 6845 · Note
- https://github.com/ray-project/ray/commit/978947083b1e192dba61ef653c863b11d56b0936⭐ 39160 🔗 6845 · Note
- https://github.com/honysyang/Ray⭐ 2 · Note
- https://twitter.com/TheCyberSecHub/status/1772942702478581925 · Twitter Post
- https://t.me/cvenotify/62591 · Telegram Post
- https://vicarius.io/vsociety/posts/the-story-of-shadowray-cve-2023-48022 · Note
- https://twitter.com/equestrecruiter/status/1777348173968572560 · Twitter Post
- https://twitter.com/jvquantum/status/1772936915471278285 · Twitter Post