Plattform
python
Komponente
bentoml
Behoben in
1.4.35
1.4.34
CVE-2026-24123 describes a Path Traversal vulnerability within BentoML, a Python framework for deploying machine learning models. This flaw allows attackers to extract arbitrary files from the filesystem and embed them within Bento archives, posing a significant supply chain risk. The vulnerability impacts versions of BentoML up to 1.4.9, and a fix is available in version 1.4.34.
The primary impact of CVE-2026-24123 is the potential for supply chain attacks. An attacker can embed malicious content, such as SSH keys, credentials, or sensitive environment variables, within a BentoML archive (bento). This occurs when a victim builds a crafted bentofile.yaml which contains path traversal sequences. When the victim builds the bento, the attacker-controlled files are silently included. These compromised bentos can then be pushed to registries or deployed, potentially compromising downstream systems. The ability to extract arbitrary files significantly expands the attack surface, allowing attackers to gain access to sensitive data and potentially escalate privileges.
CVE-2026-24123 was publicly disclosed on January 26, 2026. There is currently no indication of active exploitation, and no public proof-of-concept (PoC) code has been released. The vulnerability has not been added to the CISA KEV catalog as of this writing. Given the nature of the vulnerability and the potential for supply chain compromise, it is prudent to apply the patch or implement mitigations promptly.
Organizations heavily reliant on BentoML for deploying machine learning models, particularly those using shared Bento registries or automated build pipelines, are at increased risk. Teams using BentoML in CI/CD environments or those integrating BentoML with other systems that handle sensitive data are also particularly vulnerable.
• python: Monitor BentoML build processes for unusual file access patterns. Use strace or similar tools to observe file system calls made during Bento builds.
strace -e trace=file -p <bentoml_process_id>• generic web: Inspect BentoML registry images for unexpected files or anomalies. Check the contents of deployed Bentos for suspicious files.
• linux / server: Examine system logs for attempts to access files outside of the expected BentoML working directory. Use auditd to monitor file access events.
auditctl -w /path/to/bentoml/working/directory -p wa -k bentoml_accessdisclosure
Exploit-Status
EPSS
0.01% (1% Perzentil)
CISA SSVC
CVSS-Vektor
The recommended mitigation is to upgrade to BentoML version 1.4.34 or later, which addresses the path traversal vulnerability. If upgrading is not immediately feasible, consider implementing strict input validation on bentofile.yaml files to prevent path traversal attempts. This can involve whitelisting allowed characters and restricting the depth of file paths. Additionally, review any existing bentos for suspicious content before deployment. There are no specific WAF rules or detection signatures readily available, so focusing on input validation and regular security audits is crucial.
Actualice la biblioteca BentoML a la versión 1.4.34 o superior. Esto corregirá la vulnerabilidad de path traversal en la configuración de `bentofile.yaml`. Puede actualizar usando `pip install bentoml==1.4.34` o una versión más reciente.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-24123 is a Path Traversal vulnerability in BentoML versions up to 1.4.9, allowing attackers to extract files from the filesystem and embed them in Bento archives, posing a supply chain risk.
You are affected if you are using BentoML versions 1.4.9 or earlier. Upgrade to 1.4.34 or later to mitigate the vulnerability.
The recommended fix is to upgrade to BentoML version 1.4.34 or later. Implement stricter file access controls and review bentofile.yaml files from untrusted sources.
While no public exploits are currently known, the vulnerability's nature suggests a potential for exploitation, and proactive mitigation is recommended.
Refer to the official BentoML security advisories and release notes on the BentoML GitHub repository for the most up-to-date information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine requirements.txt-Datei hoch und wir sagen dir sofort, ob du betroffen bist.