First published: Thu Mar 20 2025(Updated: )
A vulnerability in the h2oai/h2o-3 REST API versions 3.46.0.4 allows unauthenticated remote attackers to execute arbitrary code via deserialization of untrusted data. The vulnerability exists in the endpoints POST /99/ImportSQLTable and POST /3/SaveToHiveTable, where user-controlled JDBC URLs are passed to DriverManager.getConnection, leading to deserialization if a MySQL or PostgreSQL driver is available in the classpath. This issue is fixed in version 3.46.0.6.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
H2O-3 | <3.47.0 | |
maven/ai.h2o:h2o-core | <3.46.0.6 | 3.46.0.6 |
pip/h2o | <3.46.0.6 | 3.46.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10553 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-10553, upgrade h2o-3 to version 3.47.0 or later, which contains the necessary patches.
CVE-2024-10553 affects h2o-3 versions prior to 3.47.0.
Yes, CVE-2024-10553 can be exploited remotely by unauthenticated attackers.
The vulnerable API endpoints in CVE-2024-10553 are POST /99/ImportSQLTable and POST /3/SaveToHiveTable.