Описание
H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.
Ссылки
- Third Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.46.0.4 (включая)
cpe:2.3:a:h2o:h2o:*:*:*:*:*:*:*:*
EPSS
Процентиль: 29%
0.00106
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-502
Связанные уязвимости
CVSS3: 9.1
github
больше 1 года назад
H2O.ai H2O vulnerable to deserialization attacks via a JDBC Connection URL
EPSS
Процентиль: 29%
0.00106
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-502