{ "id": "CVE-2024-2912", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-16T00:15:11.427", "lastModified": "2024-05-22T16:15:09.713", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted POST request. By exploiting this vulnerability, attackers can execute arbitrary commands on the server hosting the BentoML application. The vulnerability is triggered when a serialized object, crafted to execute OS commands upon deserialization, is sent to any valid BentoML endpoint. This issue poses a significant security risk, enabling attackers to compromise the server and potentially gain unauthorized access or control." }, { "lang": "es", "value": "Existe una vulnerabilidad de deserializaci\u00f3n insegura en el framework BentoML, que permite la ejecuci\u00f3n remota de c\u00f3digo (RCE) mediante el env\u00edo de una solicitud POST especialmente manipulada. Al explotar esta vulnerabilidad, los atacantes pueden ejecutar comandos arbitrarios en el servidor que aloja la aplicaci\u00f3n BentoML. La vulnerabilidad se activa cuando un objeto serializado, manipulado para ejecutar comandos del sistema operativo tras la deserializaci\u00f3n, se env\u00eda a cualquier endpoint v\u00e1lido de BentoML. Este problema plantea un riesgo de seguridad importante, ya que permite a los atacantes comprometer el servidor y potencialmente obtener acceso o control no autorizados." } ], "metrics": { "cvssMetricV31": [ { "source": "security@huntr.dev", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, "impactScore": 6.0 } ] }, "weaknesses": [ { "source": "security@huntr.dev", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-1188" } ] } ], "references": [ { "url": "https://github.com/bentoml/bentoml/commit/fd70379733c57c6368cc022ac1f841b7b426db7b", "source": "security@huntr.dev" }, { "url": "https://huntr.com/bounties/349a1cce-6bb5-4345-82a5-bf7041b65a68", "source": "security@huntr.dev" } ] }