First published: Thu Mar 20 2025(Updated: )
A vulnerability in the `/3/Parse` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint uses a user-specified string to construct a regular expression, which is then applied to another user-specified string. By sending multiple simultaneous requests, an attacker can exhaust all available threads, leading to a complete denial of service.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
H2O-3 | ||
maven/ai.h2o:h2o-core | >=3.30.0.7<=3.46.0.1 | |
pip/h2o | >=3.30.0.7<=3.46.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10549 is considered a high-severity vulnerability due to its potential for causing denial of service (DoS) attacks.
To fix CVE-2024-10549, update to the latest version of h2oai/h2o-3 that addresses this vulnerability.
CVE-2024-10549 can lead to denial of service, making the application unresponsive to legitimate requests.
CVE-2024-10549 affects H2O-3 version 3.46.0.1 and potentially earlier versions.
CVE-2024-10549 allows a denial of service by exploiting the `/3/Parse` endpoint, which improperly handles user-specified strings for regular expression construction.