Untriaged
Permalink
CVE-2026-33744
7.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
BentoML has Dockerfile Command Injection via system_packages in bentofile.yaml
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during `bentoml containerize` / `docker build`. Version 1.4.37 fixes the issue.
References
-
https://github.com/bentoml/BentoML/security/advisories/GHSA-jfjg-vc52-wqvf x_refsource_CONFIRM
Affected products
BentoML
- ==< 1.4.37
Matching in nixpkgs
pkgs.python312Packages.bentoml
Build Production-Grade AI Applications
Package maintainers
-
@natsukium Tomoya Otabi <nixpkgs@natsukium.com>
-
@happysalada Raphael Megzari <raphael@megzari.com>