First published: Thu Mar 20 2025(Updated: )
A vulnerability in the `/3/ParseSetup` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. This can be exploited by an attacker to cause inefficient regular expression complexity, leading to the exhaustion of server resources and making the server unresponsive.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
H2O-3 | ||
maven/ai.h2o:h2o-core | >=3.30.0.7<=3.46.0.1 | |
pip/h2o | >=3.30.0.7<=3.46.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10550 has a severity rating that indicates it can be exploited for a denial of service (DoS) attack.
CVE-2024-10550 affects H2O-3 versions from 3.30.0.7 up to 3.46.0.1.
To mitigate CVE-2024-10550, upgrade to a version of H2O-3 that is not vulnerable, typically beyond 3.46.0.1.
CVE-2024-10550 enables a denial of service (DoS) attack through the exploitation of the `/3/ParseSetup` endpoint.
The issue related to CVE-2024-10550 can be found in the code for the `/3/ParseSetup` endpoint in the H2O-3 project.