bentoml@1.4.1 vulnerabilities

BentoML: The easiest way to serve AI apps and models

Direct Vulnerabilities

Known vulnerabilities in the bentoml package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Server-side Request Forgery (SSRF)

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the MultipartSerde. ensure_file and JSONSerde.parse_request processes. An attacker can cause the server to make arbitrary HTTP requests to internal or external endpoints by supplying crafted URLs in multipart form fields or JSON request bodies.

How to fix Server-side Request Forgery (SSRF)?

Upgrade bentoml to version 1.4.19 or higher.

[1.4.0,1.4.19)
  • C
Deserialization of Untrusted Data

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Deserialization of Untrusted Data in the runner server, which is accessible via the id parameter in a POST request. An attacker can execute arbitrary code by injecting commands into the headers related to that parameter.

How to fix Deserialization of Untrusted Data?

Upgrade bentoml to version 1.4.8 or higher.

[1.0.0,1.4.8)
  • C
Deserialization of Untrusted Data

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Deserialization of Untrusted Data in the deserialize_value() function, which is accessible over the /summarize endpoint. An attacker can execute code on the server by sending a malicious serialized pickle object in an HTTP request.

How to fix Deserialization of Untrusted Data?

Upgrade bentoml to version 1.4.3 or higher.

[1.3.8,1.4.3)
  • C
Deserialization of Untrusted Data

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the args-number parameter. An attacker can execute unauthorized arbitrary code on the server by setting a value greater than 1 to the args-number parameter.

How to fix Deserialization of Untrusted Data?

Upgrade bentoml to version 1.4.8 or higher.

[,1.4.8)
  • H
Denial of Service (DoS)

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Denial of Service (DoS) via the multipart boundary processing. An attacker can cause the server to allocate excessive resources and become unresponsive by appending characters such as dashes (-) to the end of a multipart boundary in an HTTP request.

Note:

This is only exploitable if the server is configured to process multipart boundaries without adequate validation or limits.

How to fix Denial of Service (DoS)?

There is no fixed version for bentoml.

[0,)