{ "schema_version": "1.4.0", "id": "GHSA-9g44-gwvm-hc44", "modified": "2025-03-21T03:32:48Z", "published": "2025-03-20T12:32:50Z", "aliases": [ "CVE-2024-9070" ], "summary": "BentoML deserialization vulnerability", "details": "A deserialization vulnerability exists in BentoML's runner server in bentoml/bentoml versions <=1.3.4.post1. By setting specific parameters, an attacker can execute unauthorized arbitrary code on the server, causing severe harm. The vulnerability is triggered when the args-number parameter is greater than 1, leading to automatic deserialization and arbitrary code execution.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [ { "package": { "ecosystem": "PyPI", "name": "bentoml" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "last_affected": "1.4.5" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9070" }, { "type": "PACKAGE", "url": "https://github.com/bentoml/BentoML" }, { "type": "WEB", "url": "https://github.com/bentoml/BentoML/blob/a6f5f937be6ec278f3d4f3bbc6f3c8f9564820d7/src/bentoml/_internal/server/runner_app.py#L297" }, { "type": "WEB", "url": "https://github.com/bentoml/BentoML/blob/v1.4.5/src/bentoml/_internal/server/runner_app.py#L301" }, { "type": "WEB", "url": "https://huntr.com/bounties/7be6fc22-be18-44ee-a001-ac7158d5e1a5" } ], "database_specific": { "cwe_ids": [ "CWE-502" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2025-03-21T03:32:48Z", "nvd_published_at": "2025-03-20T10:15:46Z" } }