PT-2023-8933 · Anyscale · Anyscale Ray
Jakaba01
·
Published
2023-08-28
·
Updated
2025-11-30
·
CVE-2023-48022
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Anyscale Ray versions 2.6.3 through 2.8.0
Description
Anyscale Ray versions 2.6.3 and 2.8.0 contain a remote code execution issue due to insufficient validation of incoming requests through the job submission API. Attackers can exploit this to execute arbitrary code on compromised systems. The vendor states the report is irrelevant as Ray is not intended for use outside of a strictly controlled network environment. This vulnerability, dubbed ShadowRay, has been actively exploited in campaigns to compromise AI compute clusters and create a self-propagating botnet. The campaign has impacted numerous organizations, with over 230,000 Ray servers exposed. Attackers leverage the vulnerability to deploy malicious Python payloads for resource optimization, establishing reverse shells for command and control, and implementing persistence mechanisms. The exploitation focuses on GPU resources for cryptocurrency mining and utilizes a self-propagating model to amplify exploitation and extract sensitive data. The vulnerability allows attackers to submit jobs via the
/api/v1/jobs API endpoint without authentication.Recommendations
For Anyscale Ray versions 2.6.3 and 2.8.0, isolate dashboard endpoints, enable authentication, restrict API access, and scan for use of the Jobs API from untrusted sources.
Exploit
Fix
DoS
RCE
SSRF
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2024-02669
CVE-2023-48022
GHSA-6WGJ-66M2-XXP2
Affected Products
Anyscale Ray
References · 97
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ray_agent_job_rce.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/jakabakos/ShadowRay-RCE-PoC-CVE-2023-48022⭐ 4 🔗 1 · Exploit
- 🔥 https://bishopfox.com/blog/ray-versions-2-6-3-2-8-0 · Exploit
- https://osv.dev/vulnerability/GHSA-6wgj-66m2-xxp2 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-48022 · Security Note
- https://osv.dev/vulnerability/CVE-2023-48022 · Vendor Advisory
- https://bdu.fstec.ru/vul/2024-02669 · Security Note
- https://github.com/ray-project/ray⭐ 39160 🔗 6845 · Note
- https://github.com/ray-project/ray/commit/978947083b1e192dba61ef653c863b11d56b0936⭐ 39160 🔗 6845 · Note
- https://github.com/honysyang/Ray⭐ 2 · Note
- https://twitter.com/kairavweb3/status/1777324086147915886 · Twitter Post
- https://twitter.com/ET_Labs/status/1920943173272047673 · Twitter Post
- https://twitter.com/transilienceai/status/1830124493399847317 · Twitter Post
- https://t.me/true_secator/5575 · Telegram Post
- https://t.me/aptreports/18706 · Telegram Post