CVE-2023-48022
CRITICAL EXPLOITED NUCLEIAnyscale Ray - SSRF
Title source: ruleDescription
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)
Exploits (3)
nomisec
WORKING POC
6 stars
by jakabakos · remote
https://github.com/jakabakos/ShadowRay-RCE-PoC-CVE-2023-48022
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ray_agent_job_rce.rb
Nuclei Templates (1)
Anyscale Ray - Remote Code Execution
CRITICALVERIFIEDby riteshs4hu
Shodan:
http.favicon.hash:463802404 || http.html:"ray dashboard"
FOFA:
icon_hash=463802404 || body="ray dashboard"
References (6)
Scores
CVSS v3
9.8
EPSS
0.9219
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-03-26
CWE
CWE-918
Status
published
Products (3)
anyscale/ray
2.6.3
anyscale/ray
2.8.0
pypi/ray
0PyPI
Published
Nov 28, 2023
Tracked Since
Feb 18, 2026