Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-48022

Опубликовано: 07 авг. 2025
Источник: redhat
EPSS Критический

Описание

Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment

A flaw was found in ray. The job submission API allows a remote attacker to execute arbitrary code due to insufficient input validation. An unauthenticated attacker can trigger this vulnerability by sending a malicious job submission request. Successful exploitation results in arbitrary code execution on the affected Ray cluster.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat AI Inference Serverrhaiis/vllm-cuda-rhel9Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-codeflare-operator-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-codeflare-operator-rhel9Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-dashboard-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-data-science-pipelines-argo-argoexec-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-data-science-pipelines-operator-controller-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-data-science-pipelines-operator-controller-rhel9Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-kf-notebook-controller-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-kf-notebook-controller-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2387122ray: Ray Job Submission Arbitrary Code Execution

EPSS

Процентиль: 100%
0.91765
Критический

Связанные уязвимости

CVSS3: 9.8
nvd
около 2 лет назад

Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)

CVSS3: 9.8
github
около 2 лет назад

Ray has arbitrary code execution via jobs submission API

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость реализации прикладного программного интерфейса Client фреймворка для масштабирования приложений AI и Python Ray, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 100%
0.91765
Критический