CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-6854: Arbitrary File Overwrite in h2oai/h2o-3

7.1 CVSS

Description

In h2oai/h2o-3 version 3.46.0, the endpoint for exporting models does not restrict the export location, allowing an attacker to export a model to any file in the server's file structure, thereby overwriting it. This vulnerability can be exploited to overwrite any file on the target server with a trained model file, although the content of the overwrite is not controllable by the attacker.

Classification

CVE ID: CVE-2024-6854

CVSS Base Severity: HIGH

CVSS Base Score: 7.1

CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

Problem Types

CWE-36 Absolute Path Traversal

Affected Products

Vendor: h2oai

Product: h2oai/h2o-3

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 19.81% (scored less or equal to compared to others)

EPSS Date: 2025-04-18 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2024-6854
https://huntr.com/bounties/97d013f9-ac51-4c80-8dd7-8dfde11f33b2

Timeline