Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hrmc-jmp7-mpm2

Опубликовано: 06 сент. 2024
Источник: github
Github: Прошло ревью
CVSS3: 9.1

Описание

H2O.ai H2O vulnerable to deserialization attacks via a JDBC Connection URL

H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.

Пакеты

Наименование

ai.h2o:h2o-core

maven
Затронутые версииВерсия исправления

<= 3.46.0.7

Отсутствует

Наименование

h2o

pip
Затронутые версииВерсия исправления

<= 3.46.0.7

Отсутствует

EPSS

Процентиль: 33%
0.00129
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.1
nvd
больше 1 года назад

H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.

EPSS

Процентиль: 33%
0.00129
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-502