An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted POST request. By exploiting this vulnerability, attackers can execute arbitrary commands on the server hosting the BentoML application. The vulnerability is triggered when a serialized object, crafted to execute OS commands upon deserialization, is sent to any valid BentoML endpoint. This issue poses a significant security risk, enabling attackers to compromise the server and potentially gain unauthorized access or control.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2024-08-01T19:25:42.151Z

Reserved: 2024-03-26T14:04:26.687Z

Link: CVE-2024-2912

cve-icon Vulnrichment

Updated: 2024-08-01T19:25:42.151Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-16T00:15:11.427

Modified: 2024-11-21T09:10:49.283

Link: CVE-2024-2912

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:31:11Z