bentoml@0.7.5 vulnerabilities

BentoML: The easiest way to serve AI apps and models

Direct Vulnerabilities

Known vulnerabilities in the bentoml package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Deserialization of Untrusted Data

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the args-number parameter. An attacker can execute unauthorized arbitrary code on the server by setting a value greater than 1 to the args-number parameter.

How to fix Deserialization of Untrusted Data?

Upgrade bentoml to version 1.4.8 or higher.

[,1.4.8)
  • H
Denial of Service (DoS)

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Denial of Service (DoS) via the multipart boundary processing. An attacker can cause the server to allocate excessive resources and become unresponsive by appending characters such as dashes (-) to the end of a multipart boundary in an HTTP request.

Note:

This is only exploitable if the server is configured to process multipart boundaries without adequate validation or limits.

How to fix Denial of Service (DoS)?

There is no fixed version for bentoml.

[0,)
  • C
Insecure Deserialization

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Insecure Deserialization due to sending a single POST request to any valid endpoint. An attacker can execute arbitrary commands on the server.

How to fix Insecure Deserialization?

Upgrade bentoml to version 1.2.5 or higher.

[,1.2.5)