Логотип exploitDog
bind:CVE-2024-2912
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-2912

Количество 2

Количество 2

nvd логотип

CVE-2024-2912

почти 2 года назад

An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted POST request. By exploiting this vulnerability, attackers can execute arbitrary commands on the server hosting the BentoML application. The vulnerability is triggered when a serialized object, crafted to execute OS commands upon deserialization, is sent to any valid BentoML endpoint. This issue poses a significant security risk, enabling attackers to compromise the server and potentially gain unauthorized access or control.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-hvj5-mvw9-93j3

почти 2 года назад

Insecure deserialization in BentoML

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-2912

An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted POST request. By exploiting this vulnerability, attackers can execute arbitrary commands on the server hosting the BentoML application. The vulnerability is triggered when a serialized object, crafted to execute OS commands upon deserialization, is sent to any valid BentoML endpoint. This issue poses a significant security risk, enabling attackers to compromise the server and potentially gain unauthorized access or control.

CVSS3: 10
7%
Низкий
почти 2 года назад
github логотип
GHSA-hvj5-mvw9-93j3

Insecure deserialization in BentoML

CVSS3: 9.8
7%
Низкий
почти 2 года назад

Уязвимостей на страницу