UNKNOWNCVE-2026-33744
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during
Platform
docker
Component
docker
Fixed in
1.4.37
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during `bentoml containerize` / `docker build`. Version 1.4.37 fixes the issue.
How to fix
Actualice BentoML a la versión 1.4.37 o superior. Esto corrige la vulnerabilidad de inyección de comandos en el archivo bentofile.yaml. La actualización se puede realizar utilizando el gestor de paquetes pip: `pip install -U bentoml`.
Monitor your dependencies automatically
Get notified when new vulnerabilities affect your projects. Free forever.
Start free