Описание
H2O affected by a deserialization vulnerability
A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.7, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
Пакеты
ai.h2o:h2o-core
<= 3.46.0.7
Отсутствует
h2o
<= 3.46.0.7
Отсутствует
Связанные уязвимости
A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
Уязвимость платформы машинного обучения H2O, связанная с недостатками механизма десериализации, позволяющая нарушителю обойти ограничения безопасности, раскрыть защищаемую информацию и выполнить произвольный код