Description
The H2O machine learning platform uses "Iced" classes as the primary means of moving Java Objects around the cluster. The Iced format supports inclusion of serialized Java objects. When a model is deserialized, any class is allowed to be deserialized (no class whitelist). An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2430 | The H2O machine learning platform uses "Iced" classes as the primary means of moving Java Objects around the cluster. The Iced format supports inclusion of serialized Java objects. When a model is deserialized, any class is allowed to be deserialized (no class whitelist). An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform. |
Github GHSA |
GHSA-w36w-948j-xhfw | H2O vulnerable to Deserialization of Untrusted Data |
References
History
No history.
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-11-25T12:47:17.311Z
Reserved: 2024-07-21T06:38:54.536Z
Link: CVE-2024-6960
Updated: 2024-08-01T21:45:38.400Z
Status : Deferred
Published: 2024-07-21T10:15:04.497
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-6960
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA