U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-2912

Change History

New CVE Received by NIST 4/15/2024 8:15:11 PM

Action Type Old Value New Value
Added CVSS V3

								
							
							
						
huntr.dev AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
huntr.dev CWE-1188
Added Description

								
							
							
						
An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted POST request. By exploiting this vulnerability, attackers can execute arbitrary commands on the server hosting the BentoML application. The vulnerability is triggered when a serialized object, crafted to execute OS commands upon deserialization, is sent to any valid BentoML endpoint. This issue poses a significant security risk, enabling attackers to compromise the server and potentially gain unauthorized access or control.
Added Reference

								
							
							
						
huntr.dev https://github.com/bentoml/bentoml/commit/fd70379733c57c6368cc022ac1f841b7b426db7b [No types assigned]
Added Reference

								
							
							
						
huntr.dev https://huntr.com/bounties/349a1cce-6bb5-4345-82a5-bf7041b65a68 [No types assigned]