First published: Fri May 02 2025(Updated: )
A vulnerability in the S3 bucket configuration for h2oai/h2o-3 allows public write access to the 'h2o-release' bucket. This issue affects all versions and could enable an attacker to overwrite any file in the bucket. As users download binary files such as JARs from this bucket, this vulnerability could lead to remote code execution (RCE) on any user who uses the application. Additionally, an attacker could modify the documentation to include malicious download links.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
H2O-3 | <=all |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0782 has been classified as a high severity vulnerability due to its potential to allow unauthorized public write access to sensitive files in the S3 bucket.
To fix CVE-2025-0782, reconfigure the S3 bucket permissions to ensure that public write access is disabled.
CVE-2025-0782 allows an attacker to overwrite any file in the affected 'h2o-release' S3 bucket, potentially compromising your application's integrity.
CVE-2025-0782 affects all versions of h2oai/h2o-3, allowing for public write access regardless of the version.
Yes, CVE-2025-0782 is exploitable remotely, allowing attackers to manipulate files in the S3 bucket without needing direct access to the system.