CVE-2024-8982

Local File Inclusion in bentoml/openllm

Description

A Local File Inclusion (LFI) vulnerability in OpenLLM version 0.6.10 allows attackers to include files from the local server through the web application. This flaw could expose internal server files and potentially sensitive information such as configuration files, passwords, and other critical data. Unauthorized access to critical server files, such as configuration files, user credentials (/etc/passwd), and private keys, can lead to a complete compromise of the system's security. Attackers could leverage the exposed information to further penetrate the network, exfiltrate data, or escalate privileges within the environment.

Category

6.2
CVSS
Severity: Medium
CVSS 3.0 •
EPSS 0.02%
Affected: bentoml bentoml/openllm
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-8982?
CVE-2024-8982 has been scored as a medium severity vulnerability.
How to fix CVE-2024-8982?
To fix CVE-2024-8982, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-8982 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-8982 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-8982?
CVE-2024-8982 affects bentoml bentoml/openllm.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.