Vulnerabilities
Vulnerable Software
H2o:  Security Vulnerabilities
A vulnerability, which was classified as critical, has been found in h2oai h2o-3 3.46.0.4. This issue affects the function getConnectionSafe of the file /dtale/chart-data/1 of the component JDBC Connection Handler. The manipulation of the argument query leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
7.3
EPSS Score
0.006
Published
2024-09-14
In h2oai/h2o-3 version 3.46.0, the `run_tool` command in the `rapids` component allows the `main` function of any class under the `water.tools` namespace to be called. One such class, `MojoConvertTool`, crashes the server when invoked with an invalid argument, causing a denial of service.
CVSS Score
7.5
EPSS Score
0.001
Published
2024-06-27
In h2oai/h2o-3 version 3.40.0.4, an exposure of sensitive information vulnerability exists due to an arbitrary system path lookup feature. This vulnerability allows any remote user to view full paths in the entire file system where h2o-3 is hosted. Specifically, the issue resides in the Typeahead API call, which when requested with a typeahead lookup of '/', exposes the root filesystem including directories such as /home, /usr, /bin, among others. This vulnerability could allow attackers to explore the entire filesystem, and when combined with a Local File Inclusion (LFI) vulnerability, could make exploitation of the server trivial.
CVSS Score
5.3
EPSS Score
0.011
Published
2024-06-06
An S3 bucket takeover vulnerability was identified in the h2oai/h2o-3 repository. The issue involves the S3 bucket 'http://s3.amazonaws.com/h2o-training', which was found to be vulnerable to unauthorized takeover.
CVSS Score
7.1
EPSS Score
0.001
Published
2024-04-16
External Control of File Name or Path in h2oai/h2o-3
CVSS Score
9.3
EPSS Score
0.002
Published
2023-12-14
A Local File Inclusion (LFI) vulnerability exists in the h2o-3 REST API, allowing unauthenticated remote attackers to read arbitrary files on the server with the permissions of the user running the h2o-3 instance. This issue affects the default installation and does not require user interaction. The vulnerability can be exploited by making specific GET or POST requests to the ImportFiles and ParseSetup endpoints, respectively. This issue was identified in version 3.40.0.4 of h2o-3.
CVSS Score
9.3
EPSS Score
0.574
Published
2023-11-16
H2O is vulnerable to stored XSS vulnerability which can lead to a Local File Include attack.
CVSS Score
9.3
EPSS Score
0.002
Published
2023-11-16
H2O included a reference to an S3 bucket that no longer existed allowing an attacker to take over the S3 bucket URL.
CVSS Score
8.7
EPSS Score
0.002
Published
2023-11-16
An attacker is able to gain remote code execution on a server hosting the H2O dashboard through it's POJO model import feature.
CVSS Score
10.0
EPSS Score
0.736
Published
2023-11-16


Contact Us

Shodan ® - All rights reserved