Логотип exploitDog
bind:CVE-2026-24123
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-24123

Количество 2

Количество 2

nvd логотип

CVE-2026-24123

13 дней назад

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to version 1.4.34, BentoML's `bentofile.yaml` configuration allows path traversal attacks through multiple file path fields (`description`, `docker.setup_script`, `docker.dockerfile_template`, `conda.environment_yml`). An attacker can craft a malicious bentofile that, when built by a victim, exfiltrates arbitrary files from the filesystem into the bento archive. This enables supply chain attacks where sensitive files (SSH keys, credentials, environment variables) are silently embedded in bentos and exposed when pushed to registries or deployed. Version 1.4.34 contains a patch for the issue.

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-6r62-w2q3-48hf

13 дней назад

BentoML has a Path Traversal via Bentofile Configuration

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-24123

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to version 1.4.34, BentoML's `bentofile.yaml` configuration allows path traversal attacks through multiple file path fields (`description`, `docker.setup_script`, `docker.dockerfile_template`, `conda.environment_yml`). An attacker can craft a malicious bentofile that, when built by a victim, exfiltrates arbitrary files from the filesystem into the bento archive. This enables supply chain attacks where sensitive files (SSH keys, credentials, environment variables) are silently embedded in bentos and exposed when pushed to registries or deployed. Version 1.4.34 contains a patch for the issue.

CVSS3: 7.4
0%
Низкий
13 дней назад
github логотип
GHSA-6r62-w2q3-48hf

BentoML has a Path Traversal via Bentofile Configuration

CVSS3: 7.4
0%
Низкий
13 дней назад

Уязвимостей на страницу