Skip to content

Conversation

@JLLeitschuh
Copy link

Updates

  • Affected products
  • CWEs
  • Description
  • References
  • Source code location
  • Summary

Comments
Added some links, added the impacted package. Reformatted a bit

Copilot AI review requested due to automatic review settings September 26, 2025 19:16
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

Updates a security advisory for CVE-2023-48022 (Ray arbitrary code execution vulnerability) to provide more comprehensive vulnerability information and references.

  • Added affected package information for the PyPI ray package
  • Enhanced vulnerability details with summary field and formatted description
  • Added additional security research references and CWE classifications

Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.

Comment on lines +28 to +30
"introduced": "0"
}
]
Copy link

Copilot AI Sep 26, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The affected package range is too broad. According to the details, only versions 2.6.3 and 2.8.0 are mentioned as vulnerable. The range should specify these exact versions or a more precise version range rather than starting from version '0' which implies all versions are affected.

Suggested change
"introduced": "0"
}
]
"introduced": "2.6.3"
},
{
"fixed": "2.6.4"
}
]
},
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.8.0"
},
{
"fixed": "2.8.1"
}
]

Copilot uses AI. Check for mistakes.
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All versions are vulnerable, there exists no fixed versions. The AI is wrong

@github-actions github-actions bot changed the base branch from main to JLLeitschuh/advisory-improvement-6219 September 26, 2025 19:17
@shelbyc
Copy link
Contributor

shelbyc commented Sep 29, 2025

👋 Hi @JLLeitschuh, I've read the reference links you provided in addition to searching for a maintainer response to https://www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild. I have a few questions with respect to clarifying the vulnerable version range.

The part of https://www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild that says "Ray remains vulnerable not only to the CVEs that were successfully fixed (running Ray versions between 2.6.3 - 2.8.0), but also ShadowRay" indicates to me that 2.6.3 may be the minimum vulnerable version. Is that the minimum vulnerable version for all of the vulnerabilities, all of the vulnerabilities that are not CVE-2023-48022, or just the minimum tested version?

A maintainer blog https://www.anyscale.com/blog/update-on-ray-cve-2023-48022-new-verification-tooling-available and commit ray-project/ray@9789470 indicate that the maintainers of Ray provided a patch for CVE-2023-48022 in version 2.11.0. I think this is enough to consider 2.11.0 a fixed version. Do you agree with listing 2.11.0 as a fixed version?

@JLLeitschuh
Copy link
Author

A maintainer blog anyscale.com/blog/update-on-ray-cve-2023-48022-new-verification-tooling-available and commit ray-project/ray@9789470 indicate that the maintainers of Ray provided a patch for GHSA-6wgj-66m2-xxp2 in version 2.11.0. I think this is enough to consider 2.11.0 a fixed version. Do you agree with listing 2.11.0 as a fixed version?

It is not fixed. The vulnerability remains present and unpatched.

That "new verification tooling available" is a scanner to detect if your are exposing public ray instances. Not an actual fix.

This vulnerability is also on VulnCheck's KEV list as it's been known to be exploited
https://console.vulncheck.com/cve/CVE-2023-48022

@JLLeitschuh
Copy link
Author

JLLeitschuh commented Sep 29, 2025

I don't know what the minimum impacted version is, but given that the jobs API is pretty fundamental to how ray operates, I would assume that almost all versions are impacted

@shelbyc
Copy link
Contributor

shelbyc commented Sep 30, 2025

I did more digging in the GitHub Advisory Database and found an advisory that indicates versions after 2.11.0 may still be vulnerable to CVE-2023-48022. CVE-2024-57000, which was issued after version 2.11.0 was released and subsequently withdrawn as a duplicate of CVE-2023-48022, links to a researcher report that says versions 2.9.3 through 2.40.0 are vulnerable. Pardon me for not finding and mentioning this advisory in my previous comment. 😅

@advisory-database advisory-database bot merged commit 47687c9 into JLLeitschuh/advisory-improvement-6219 Sep 30, 2025
4 checks passed
@advisory-database
Copy link
Contributor

Hi @JLLeitschuh! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future!

@advisory-database advisory-database bot deleted the JLLeitschuh-GHSA-6wgj-66m2-xxp2 branch September 30, 2025 18:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants