H2O Vulnerable to Arbitrary File Overwrite via File Export
High severity
GitHub Reviewed
Published
Mar 20, 2025
to the GitHub Advisory Database
•
Updated Mar 20, 2025
Description
Published by the National Vulnerability Database
Mar 20, 2025
Published to the GitHub Advisory Database
Mar 20, 2025
Reviewed
Mar 20, 2025
Last updated
Mar 20, 2025
In h2oai/h2o-3 version 3.46.0, the endpoint for exporting models does not restrict the export location, allowing an attacker to export a model to any file in the server's file structure, thereby overwriting it. This vulnerability can be exploited to overwrite any file on the target server with a trained model file, although the content of the overwrite is not controllable by the attacker.
References