Arbitrary Command Injection Affecting ray package, versions [,2.8.1)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
37.38% (98th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-RAY-6096054
- published 30 Nov 2023
- disclosed 28 Nov 2023
- credit Unknown
Introduced: 28 Nov 2023
CVE-2023-48023 Open this link in a new tabHow to fix?
Upgrade ray
to version 2.8.1 or higher.
Overview
ray is an A system for parallel and distributed Python that unifies the ML ecosystem.
Affected versions of this package are vulnerable to Arbitrary Command Injection through the /log_proxy
function. An attacker can inject arbitrary commands by submitting raw HTTP requests or via the Jobs SDK, with no authentication by default.
NOTE: The maintainers' position is that running jobs remotely is the intended behavior of the package and therefore it should not be considered vulnerable.
References
CVSS Scores
version 3.1