AVID-2026-R1454
Description
Insecure Deserialization Leading to RCE in bentoml/bentoml (CVE-2024-2912)
Details
An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted POST request. By exploiting this vulnerability, attackers can execute arbitrary commands on the server hosting the BentoML application. The vulnerability is triggered when a serialized object, crafted to execute OS commands upon deserialization, is sent to any valid BentoML endpoint. This issue poses a significant security risk, enabling attackers to compromise the server and potentially gain unauthorized access or control.
Reason for inclusion in AVID: CVE-2024-2912 describes an insecure deserialization vulnerability in BentoML (bentoml/bentoml) that enables remote code execution via AI model-serving infrastructure. BentoML is a framework/library used to build, deploy, and serve AI models, making this vulnerability directly relevant to AI software stacks and their supply chain. The issue is a software vulnerability in a dependency/tooling used in AI deployment pipelines, not a hardware/firmware issue. The description provides explicit security impact (RCE) and CVSS signals, supporting its classification as a security vulnerability in AI software supply chain.
References
- NVD entry
- https://huntr.com/bounties/349a1cce-6bb5-4345-82a5-bf7041b65a68
- https://github.com/bentoml/bentoml/commit/fd70379733c57c6368cc022ac1f841b7b426db7b
Affected or Relevant Artifacts
- Developer: bentoml
- Deployer: bentoml
- Artifact Details:
| Type | Name |
|---|---|
| System | bentoml/bentoml |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Base Score | 10.0 |
| Base Severity | 🔴 Critical |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | CHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-1188 | CWE-1188 Insecure Default Initialization of Resource |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-04-16
- Version: 0.3.3
- AVID Entry