Filtered by vendor H2o Subscriptions
Filtered by product H2o Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-6013 1 H2o 1 H2o 2024-11-27 5.4 Medium
H2O is vulnerable to stored XSS vulnerability which can lead to a Local File Include attack.
CVE-2024-5550 1 H2o 1 H2o 2024-11-21 5.3 Medium
In h2oai/h2o-3 version 3.40.0.4, an exposure of sensitive information vulnerability exists due to an arbitrary system path lookup feature. This vulnerability allows any remote user to view full paths in the entire file system where h2o-3 is hosted. Specifically, the issue resides in the Typeahead API call, which when requested with a typeahead lookup of '/', exposes the root filesystem including directories such as /home, /usr, /bin, among others. This vulnerability could allow attackers to explore the entire filesystem, and when combined with a Local File Inclusion (LFI) vulnerability, could make exploitation of the server trivial.
CVE-2023-6569 1 H2o 1 H2o 2024-11-21 8.2 High
External Control of File Name or Path in h2oai/h2o-3
CVE-2023-6038 1 H2o 1 H2o 2024-11-21 7.5 High
A Local File Inclusion (LFI) vulnerability exists in the h2o-3 REST API, allowing unauthenticated remote attackers to read arbitrary files on the server with the permissions of the user running the h2o-3 instance. This issue affects the default installation and does not require user interaction. The vulnerability can be exploited by making specific GET or POST requests to the ImportFiles and ParseSetup endpoints, respectively. This issue was identified in version 3.40.0.4 of h2o-3.
CVE-2023-6017 1 H2o 1 H2o 2024-11-21 7.1 High
H2O included a reference to an S3 bucket that no longer existed allowing an attacker to take over the S3 bucket URL.
CVE-2023-6016 1 H2o 1 H2o 2024-11-21 9.8 Critical
An attacker is able to gain remote code execution on a server hosting the H2O dashboard through it's POJO model import feature.
CVE-2024-8862 2 H2o, H2oai 2 H2o, H2o-3 2024-09-20 7.3 High
A vulnerability, which was classified as critical, has been found in h2oai h2o-3 3.46.0.4. This issue affects the function getConnectionSafe of the file /dtale/chart-data/1 of the component JDBC Connection Handler. The manipulation of the argument query leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.