Description
An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted POST request. By exploiting this vulnerability, attackers can execute arbitrary commands on the server hosting the BentoML application. The vulnerability is triggered when a serialized object, crafted to execute OS commands upon deserialization, is sent to any valid BentoML endpoint. This issue poses a significant security risk, enabling attackers to compromise the server and potentially gain unauthorized access or control.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1219 | An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted POST request. By exploiting this vulnerability, attackers can execute arbitrary commands on the server hosting the BentoML application. The vulnerability is triggered when a serialized object, crafted to execute OS commands upon deserialization, is sent to any valid BentoML endpoint. This issue poses a significant security risk, enabling attackers to compromise the server and potentially gain unauthorized access or control. |
Github GHSA |
GHSA-hvj5-mvw9-93j3 | Insecure deserialization in BentoML |
References
History
No history.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T19:25:42.151Z
Reserved: 2024-03-26T14:04:26.687Z
Link: CVE-2024-2912
Updated: 2024-08-01T19:25:42.151Z
Status : Awaiting Analysis
Published: 2024-04-16T00:15:11.427
Modified: 2024-11-21T09:10:49.283
Link: CVE-2024-2912
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:31:11Z
Weaknesses
EUVD
Github GHSA