H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 29 Sep 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
H2o
H2o h2o |
|
CPEs | cpe:2.3:a:h2o:h2o:*:*:*:*:*:*:*:* | |
Vendors & Products |
H2o
H2o h2o |
Fri, 06 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
H2oai
H2oai h2o-3 |
|
Weaknesses | CWE-502 | |
CPEs | cpe:2.3:a:h2oai:h2o-3:*:*:*:*:*:*:*:* | |
Vendors & Products |
H2oai
H2oai h2o-3 |
|
Metrics |
cvssV3_1
|
Fri, 06 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-06T17:59:17.751Z
Reserved: 2024-09-06T00:00:00
Link: CVE-2024-45758

Updated: 2024-09-06T17:53:03.513Z

Status : Analyzed
Published: 2024-09-06T16:15:03.517
Modified: 2025-09-29T13:56:10.890
Link: CVE-2024-45758

No data.

No data.