bentoml@1.4.18 vulnerabilities

BentoML: The easiest way to serve AI apps and models

Direct Vulnerabilities

Known vulnerabilities in the bentoml package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Server-side Request Forgery (SSRF)

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the MultipartSerde. ensure_file and JSONSerde.parse_request processes. An attacker can cause the server to make arbitrary HTTP requests to internal or external endpoints by supplying crafted URLs in multipart form fields or JSON request bodies.

How to fix Server-side Request Forgery (SSRF)?

Upgrade bentoml to version 1.4.19 or higher.

[1.4.0,1.4.19)
  • H
Denial of Service (DoS)

bentoml is a BentoML: Build Production-Grade AI Applications

Affected versions of this package are vulnerable to Denial of Service (DoS) via the multipart boundary processing. An attacker can cause the server to allocate excessive resources and become unresponsive by appending characters such as dashes (-) to the end of a multipart boundary in an HTTP request.

Note:

This is only exploitable if the server is configured to process multipart boundaries without adequate validation or limits.

How to fix Denial of Service (DoS)?

There is no fixed version for bentoml.

[0,)