Home » Database

AVID-2026-R1291

Description

Vulnerability CVE-2023-48022

Details

Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor’s position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)

Reason for inclusion in AVID: CVE-2023-48022 describes a remote code execution vulnerability in Anyscale Ray (versions 2.6.3 and 2.8.0) via the job submission API. Ray is a core AI framework used in ML pipelines for building, deploying, and running AI systems, placing this squarely in software supply-chain relevance for general-purpose AI stacks. The vulnerability is a security risk (RCE) and is evidenced by the CVE/NVD entry and related security discussions/advisories. The report provides explicit vulnerability behavior and references, supporting classification.

References

Affected or Relevant Artifacts

  • Developer: n/a
  • Deployer: n/a
  • Artifact Details:
TypeName
Systemn/a

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2023-11-28
  • Version: 0.3.3
  • AVID Entry