Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-48022 PoC — Ray 安全漏洞

Source
Associated Vulnerability
Title:Ray 安全漏洞 (CVE-2023-48022)
Description:Ray是ray-project开源的一个用于扩展 AI 和 Python 应用程序的统一框架。 Ray 2.6.3版本、2.8.0版本存在安全漏洞。远程攻击者利用该漏洞通过作业提交 API 执行任意代码。
Description
ShadowRay RCE POC (CVE-2023-48022)
Readme
# PoC for a remote command execution vulnerability in Ray framework (CVE-2023-48022)

This exploit script and PoC are written for an in-depth CVE analysis on [vsociety](https://www.vicarius.io/vsociety/posts/the-story-of-shadowray-cve-2023-48022).

The Ray framework, an essential tool for Python-based AI and machine learning applications, has encountered a significant security challenge. In essence, Ray is like a Swiss Army knife for people working on AI and big data projects. Identified as CVE-2023-48022, this vulnerability specifically impacts the job submission API. The official description states that this flaw allows a remote attacker to execute arbitrary code, posing a considerable risk to systems utilizing these versions of Ray. This vulnerability's discovery has underscored the importance of robust security protocols in software frameworks, especially those integral to AI and ML projects with vast data and computational power.

## Usage

First, install Ray:
```bash
pip3 install -U "ray[default]"==2.8.0
```
Then, start Ray:
```bash
ray start --head --dashboard-host=0.0.0.0
```
Run the Python exploit:
```bash
python3 exploit.py --host http://192.168.150.16:8265 --cmd '<cmd>'
```
## Metasploit module
Copy the Ruby file to Metasploit's related folder:
```bash
cp ray_job_rce.rb /usr/share/metasploit-framework/modules/exploits/multi/misc/
```
Launch Metasploit with `msfconsole` and relad modules with `reload_all` if you can't find the added one.
You can select with `use exploit/multi/misc/ray_job_rce`.
Set the necessary options (`RHOST`, `RPORT`, `COMMAND`, etc.) and run the exploit with the command `exploit`.

## Disclaimer
This exploit script has been created solely for research and the development of effective defensive techniques. It is not intended to be used for any malicious or unauthorized activities. The script's author and owner disclaim any responsibility or liability for any misuse or damage caused by this software. Just so you know, users are urged to use this software responsibly and only by applicable laws and regulations. Use responsibly.
File Snapshot

[4.0K] /data/pocs/1c49f7aa634553ab0adb2cfccdb7ff83d90a8882 ├── [1.8K] exploit.py ├── [2.9K] ray_job_rce.rb └── [2.0K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.