First published: Thu Nov 16 2023(Updated: )
A Local File Inclusion (LFI) vulnerability exists in the h2o-3 REST API, allowing unauthenticated remote attackers to read arbitrary files on the server with the permissions of the user running the h2o-3 instance. This issue affects the default installation and does not require user interaction. The vulnerability can be exploited by making specific GET or POST requests to the ImportFiles and ParseSetup endpoints, respectively. This issue was identified in version 3.40.0.4 of h2o-3.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
H2o H2o | ||
maven/ai.h2o:h2o-core | <=3.40.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6038 is a vulnerability in H2O, a popular web server, that allows an attacker to read any file on the server hosting the H2O dashboard without any authentication.
CVE-2023-6038 has a severity rating of 9.3 (critical).
H2O is affected by CVE-2023-6038.
An attacker can exploit CVE-2023-6038 to read any file on the server hosting the H2O dashboard without any authentication.
Currently, there is no known fix for CVE-2023-6038. It is recommended to keep the H2O software up to date and follow any available security recommendations from the vendor.