Логотип exploitDog
bind:CVE-2024-45758
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-45758

Количество 2

Количество 2

nvd логотип

CVE-2024-45758

больше 1 года назад

H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-hrmc-jmp7-mpm2

больше 1 года назад

H2O.ai H2O vulnerable to deserialization attacks via a JDBC Connection URL

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-45758

H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.

CVSS3: 9.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-hrmc-jmp7-mpm2

H2O.ai H2O vulnerable to deserialization attacks via a JDBC Connection URL

CVSS3: 9.1
0%
Низкий
больше 1 года назад

Уязвимостей на страницу