Описание
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.8, there was an insecure deserialization in BentoML's runner server. By setting specific headers and parameters in the POST request, it is possible to execute any unauthorized arbitrary code on the server, which will grant the attackers to have the initial access and information disclosure on the server. This vulnerability is fixed in 1.4.8.
Ссылки
- ExploitVendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 1.0.0 (включая) до 1.4.8 (исключая)
cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.55251
Средний
9.8 Critical
CVSS3
Дефекты
CWE-502
Связанные уязвимости
CVSS3: 9.8
github
10 месяцев назад
BentoML's runner server Vulnerable to Remote Code Execution (RCE) via Insecure Deserialization
EPSS
Процентиль: 98%
0.55251
Средний
9.8 Critical
CVSS3
Дефекты
CWE-502