First published: Thu Mar 20 2025(Updated: )
In h2oai/h2o-3 version 3.46.0, the `/99/Models/{name}/json` endpoint allows for arbitrary file overwrite on the target server. The vulnerability arises from the `exportModelDetails` function in `ModelsHandler.java`, where the user-controllable `mexport.dir` parameter is used to specify the file path for writing model details. This can lead to overwriting files at arbitrary locations on the host system.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
H2O-3 | ||
maven/ai.h2o:h2o-core | >=3.10.4.1<=3.46.0 | |
pip/h2o | >=3.10.4.1<=3.46.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8616 has been rated as a high severity vulnerability due to its potential for arbitrary file overwrite.
To fix CVE-2024-8616, update to the latest version of h2o-3 where the vulnerability has been patched.
CVE-2024-8616 affects h2oai's h2o-3 version 3.46.0.
CVE-2024-8616 facilitates arbitrary file overwrite attacks by misusing the exportModelDetails function.
CVE-2024-8616 can compromise server security by allowing attackers to overwrite files, potentially leading to data loss or unauthorized access.