Safety vulnerability ID: 76191
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A deserialization vulnerability exists in BentoML's runner server in bentoml/bentoml versions <=1.3.4.post1. By setting specific parameters, an attacker can execute unauthorized arbitrary code on the server, causing severe harm. The vulnerability is triggered when the args-number parameter is greater than 1, leading to automatic deserialization and arbitrary code execution.
Latest version: 1.4.7
BentoML: The easiest way to serve AI apps and models
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application