CVE-2023-48022

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-48022
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-48022.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-48022
Aliases
Published
2023-11-28T08:15:06Z
Modified
2025-10-10T04:41:11.897053Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment

Database specific
{
    "isDisputed": true
}
References

Affected packages

Git / github.com/ray-project/ray

Affected ranges

Type
GIT
Repo
https://github.com/ray-project/ray
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

ray-0.*

ray-0.1.0
ray-0.1.1
ray-0.1.2
ray-0.2.0
ray-0.2.1
ray-0.2.2
ray-0.3.0
ray-0.3.1
ray-0.4.0
ray-0.5.0
ray-0.5.1
ray-0.5.2
ray-0.5.3
ray-0.6.0
ray-0.6.1
ray-0.6.2
ray-0.6.3
ray-0.6.4
ray-0.6.5
ray-0.7.0

ray-2.*

ray-2.6.0
ray-2.6.1
ray-2.6.2
ray-2.6.3
ray-2.8.0