Skip to content

Commit d3b1b48

Browse files
1 parent 898bfff commit d3b1b48

File tree

1 file changed

+52
-6
lines changed

1 file changed

+52
-6
lines changed

advisories/unreviewed/2025/11/GHSA-gx77-xgc2-4888/GHSA-gx77-xgc2-4888.json renamed to advisories/github-reviewed/2025/11/GHSA-gx77-xgc2-4888/GHSA-gx77-xgc2-4888.json

Lines changed: 52 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gx77-xgc2-4888",
4-
"modified": "2025-11-27T03:30:26Z",
4+
"modified": "2025-12-01T20:51:10Z",
55
"published": "2025-11-27T03:30:26Z",
66
"aliases": [
77
"CVE-2025-34351"
88
],
9+
"summary": "Ray's New Token Authentication is Disabled By Default",
910
"details": "Anyscale Ray 2.52.0 contains an insecure default configuration in which token-based authentication for Ray management interfaces (including the dashboard and Jobs API) is disabled unless explicitly enabled by setting RAY_AUTH_MODE=token. In the default unauthenticated state, a remote attacker with network access to these interfaces can submit jobs and execute arbitrary code on the Ray cluster. NOTE: The vendor plans to enable token authentication by default in a future release. They recommend enabling token authentication to protect your cluster from unauthorized access.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V4",
13-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "ray"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2.52.0"
32+
}
33+
]
34+
}
35+
]
1436
}
1537
],
16-
"affected": [],
1738
"references": [
1839
{
1940
"type": "WEB",
@@ -27,18 +48,43 @@
2748
"type": "WEB",
2849
"url": "https://docs.ray.io/en/latest/ray-security/token-auth.html"
2950
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/ray-project/ray"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/ray-project/ray/releases/tag/ray-2.52.0"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.cve.org/resourcessupport/allresources/cnarules#section_4-1_Vulnerability_Determination"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.linkedin.com/posts/jonathan-leitschuh_the-latest-piece-of-mind-bending-research-activity-7396976425997606912-qizE"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://www.oligo.security/blog/shadowray-2-0-attackers-turn-ai-against-itself-in-global-campaign-that-hijacks-ai-into-self-propagating-botnet"
70+
},
71+
{
72+
"type": "WEB",
73+
"url": "https://www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild"
74+
},
3075
{
3176
"type": "WEB",
3277
"url": "https://www.vulncheck.com/advisories/anyscale-ray-token-authentication-disabled-by-default-insecure-configuration"
3378
}
3479
],
3580
"database_specific": {
3681
"cwe_ids": [
37-
"CWE-1188"
82+
"CWE-1188",
83+
"CWE-304"
3884
],
3985
"severity": "CRITICAL",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
86+
"github_reviewed": true,
87+
"github_reviewed_at": "2025-12-01T20:51:10Z",
4288
"nvd_published_at": "2025-11-27T03:15:58Z"
4389
}
4490
}

0 commit comments

Comments
 (0)