The H2O machine learning platform uses "Iced" classes as the primary means of moving Java Objects around the cluster. The Iced format supports inclusion of serialized Java objects. When a model is deserialized, any class is allowed to be deserialized (no class whitelist). An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-11-25T12:47:17.311Z

Reserved: 2024-07-21T06:38:54.536Z

Link: CVE-2024-6960

cve-icon Vulnrichment

Updated: 2024-08-01T21:45:38.400Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-21T10:15:04.497

Modified: 2024-11-25T13:15:07.713

Link: CVE-2024-6960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.