High severity7.5NVD Advisory· Published Mar 20, 2025· Updated Apr 15, 2026
CVE-2024-9056
CVE-2024-9056
Description
BentoML version v1.3.4post1 is vulnerable to a Denial of Service (DoS) attack. The vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. This causes the server to continuously process each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
bentomlPyPI | <= 1.4.5 | — |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-hw8j-hw49-752cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-9056ghsaADVISORY
- github.com/bentoml/BentoML/blob/a6f5f937be6ec278f3d4f3bbc6f3c8f9564820d7/src/bentoml/_internal/io_descriptors/file.pyghsaWEB
- github.com/bentoml/BentoML/blob/v1.4.5/src/bentoml/_internal/io_descriptors/file.pyghsaWEB
- huntr.com/bounties/a24a13c2-0300-4a95-b26a-ac7fe8f6521bnvdWEB
News mentions
0No linked articles in our index yet.