Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)
History

Wed, 17 Dec 2025 17:00:00 +0000

Type Values Removed Values Added
Description Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)
References

Fri, 08 Aug 2025 00:15:00 +0000

Type Values Removed Values Added
Title ray: Ray Job Submission Arbitrary Code Execution
First Time appeared Redhat
Redhat openshift Ai
CPEs cpe:/a:redhat:openshift_ai:2.22::el9
Vendors & Products Redhat
Redhat openshift Ai
References
Metrics threat_severity

None

threat_severity

Important


Fri, 22 Nov 2024 12:00:00 +0000


Mon, 28 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 28 Oct 2024 16:30:00 +0000

Type Values Removed Values Added
References

Mon, 19 Aug 2024 08:30:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-17T16:41:47.778Z

Reserved: 2023-11-13T00:00:00.000Z

Link: CVE-2023-48022

cve-icon Vulnrichment

Updated: 2024-08-19T07:48:03.111Z

cve-icon NVD

Status : Modified

Published: 2023-11-28T08:15:06.910

Modified: 2025-12-17T17:15:47.273

Link: CVE-2023-48022

cve-icon Redhat

Severity : Important

Publid Date: 2025-08-07T00:00:00Z

Links: CVE-2023-48022 - Bugzilla

cve-icon OpenCVE Enrichment

No data.