First published: Tue Nov 28 2023(Updated: )
Anyscale Ray 2.6.3 and 2.8.0 allows /log_proxy SSRF. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
=2.6.3 | ||
=2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-48023 is a vulnerability in Anyscale Ray 2.6.3 and 2.8.0 that allows Server-Side Request Forgery (SSRF) through the /log_proxy endpoint.
The severity of CVE-2023-48023 is critical with a severity value of 9.1.
Anyscale Ray versions 2.6.3 and 2.8.0 are affected by CVE-2023-48023.
The vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment.
There is currently no official fix available for CVE-2023-48023. It is recommended to follow the vendor's guidance and use Ray only in a strictly controlled network environment.