In bentoml/bentoml version 1.3.9, the `/login` endpoint of the newly integrated Gradio app is vulnerable to a Denial of Service (DoS) attack. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously processes each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In bentoml/bentoml version 1.3.9, the `/login` endpoint of the newly integrated Gradio app is vulnerable to a Denial of Service (DoS) attack. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously processes each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction. | |
Title | Denial of Service (DoS) via Multipart Boundary in bentoml/bentoml | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T17:56:59.562Z
Reserved: 2024-12-18T18:06:22.125Z
Link: CVE-2024-12759

Updated: 2025-03-20T17:56:39.283Z

Status : Awaiting Analysis
Published: 2025-03-20T10:15:29.630
Modified: 2025-03-20T18:15:17.887
Link: CVE-2024-12759

No data.