Server-side Request Forgery (SSRF) Affecting ray package, versions [,2.8.1)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-RAY-6094984
- published 30 Nov 2023
- disclosed 28 Nov 2023
- credit Harry Ha
Introduced: 28 Nov 2023
CVE-2023-48022 Open this link in a new tabHow to fix?
Upgrade ray
to version 2.8.1 or higher.
Overview
ray is an A system for parallel and distributed Python that unifies the ML ecosystem.
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the dashboard API, via the url
parameter of the /log_proxy
API endpoint. An attacker can retrieve the highly privileged IAM credentials required by Ray from the AWS metadata API, due to insufficient input validation within the affected parameter.
Notes:
The maintainer's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment.
The maintainers have made a verification tool available to check a deployment for vulnerability to this issue: https://github.com/ray-project/ray-open-ports-checker