CVE-2025-54381 (CNNVD-202507-3667)
中文标题:
BentoML 代码问题漏洞
英文标题:
BentoML is Vulnerable to an SSRF Attack Through File Upload Processing
漏洞描述
中文描述:
BentoML是BentoML开源的一个开源模型服务库。用于使用 Python 构建高性能和可扩展的人工智能应用程序。 BentoML 1.4.0至1.4.19版本存在代码问题漏洞,该漏洞源于文件上传处理系统未验证用户提供的URL,可能导致服务端请求伪造攻击。
英文描述:
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. In versions 1.4.0 until 1.4.19, the file upload processing system contains an SSRF vulnerability that allows unauthenticated remote attackers to force the server to make arbitrary HTTP requests. The vulnerability stems from the multipart form data and JSON request handlers, which automatically download files from user-provided URLs without validating whether those URLs point to internal network addresses, cloud metadata endpoints, or other restricted resources. The documentation explicitly promotes this URL-based file upload feature, making it an intended design that exposes all deployed services to SSRF attacks by default. Version 1.4.19 contains a patch for the issue.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| bentoml | BentoML | >= 1.4.0, < 1.4.19 | - | - |
cpe:2.3:a:bentoml:bentoml:>=_1.4.0,_<_1.4.19:*:*:*:*:*:*:*
|
| bentoml | bentoml | * | - | - |
cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-54381 |
2025-11-11 15:23:28 | 2025-11-11 07:40:42 |
| NVD | nvd_CVE-2025-54381 |
2025-11-11 15:00:58 | 2025-11-11 07:48:29 |
| CNNVD | cnnvd_CNNVD-202507-3667 |
2025-11-11 15:12:52 | 2025-11-11 08:00:02 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-202507-3667
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']