A deserialization vulnerability exists in BentoML's runner server in bentoml/bentoml versions <=1.3.4.post1. By setting specific parameters, an attacker can execute unauthorized arbitrary code on the server, causing severe harm. The vulnerability is triggered when the args-number parameter is greater than 1, leading to automatic deserialization and arbitrary code execution.
CVE ID: CVE-2024-9070
CVSS Base Severity: CRITICAL
CVSS Base Score: 9.8
CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vendor: bentoml
Product: bentoml/bentoml
EPSS Score: 0.08% (probability of being exploited)
EPSS Percentile: 23.59% (scored less or equal to compared to others)
EPSS Date: 2025-04-18 (when was this score calculated)