File tree Expand file tree Collapse file tree 1 file changed +59
-0
lines changed
Expand file tree Collapse file tree 1 file changed +59
-0
lines changed Original file line number Diff line number Diff line change 6154561545 "session_types": false,
6154661546 "needs_cleanup": null
6154761547 },
61548+ "exploit_linux/http/bentoml_rce_cve_2025_27520": {
61549+ "name": "BentoML RCE",
61550+ "fullname": "exploit/linux/http/bentoml_rce_cve_2025_27520",
61551+ "aliases": [],
61552+ "rank": 600,
61553+ "disclosure_date": "2025-04-04",
61554+ "type": "exploit",
61555+ "author": [
61556+ "c2an1",
61557+ "Takahiro Yokoyama"
61558+ ],
61559+ "description": "A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in v1.4.2 of BentoML.\n It allows any unauthenticated user to execute arbitrary code on the server.",
61560+ "references": [
61561+ "CVE-2025-27520",
61562+ "URL-https://github.com/advisories/GHSA-33xw-247w-6hmc"
61563+ ],
61564+ "platform": "",
61565+ "arch": "",
61566+ "rport": 3000,
61567+ "autofilter_ports": [
61568+ 80,
61569+ 8080,
61570+ 443,
61571+ 8000,
61572+ 8888,
61573+ 8880,
61574+ 8008,
61575+ 3000,
61576+ 8443
61577+ ],
61578+ "autofilter_services": [
61579+ "http",
61580+ "https"
61581+ ],
61582+ "targets": [
61583+ "Python payload",
61584+ "Linux Command"
61585+ ],
61586+ "mod_time": "2025-04-16 22:05:04 +0000",
61587+ "path": "/modules/exploits/linux/http/bentoml_rce_cve_2025_27520.rb",
61588+ "is_install_path": true,
61589+ "ref_name": "linux/http/bentoml_rce_cve_2025_27520",
61590+ "check": true,
61591+ "post_auth": false,
61592+ "default_credential": false,
61593+ "notes": {
61594+ "Stability": [
61595+ "crash-safe"
61596+ ],
61597+ "SideEffects": [
61598+ "ioc-in-logs"
61599+ ],
61600+ "Reliability": [
61601+ "repeatable-session"
61602+ ]
61603+ },
61604+ "session_types": false,
61605+ "needs_cleanup": null
61606+ },
6154861607 "exploit_linux/http/beyondtrust_pra_rs_unauth_rce": {
6154961608 "name": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) unauthenticated Remote Code Execution",
6155061609 "fullname": "exploit/linux/http/beyondtrust_pra_rs_unauth_rce",
You can’t perform that action at this time.
0 commit comments