External Control of File Name or Path Affecting ai.h2o:h2o-core package, versions [,3.46.0.1)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (18th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-AIH2O-6125894
- published 14 Dec 2023
- disclosed 14 Dec 2023
- credit Dan McInerney
Introduced: 14 Dec 2023
CVE-2023-6569 Open this link in a new tabHow to fix?
Upgrade ai.h2o:h2o-core
to version 3.46.0.1 or higher.
Overview
Affected versions of this package are vulnerable to External Control of File Name or Path via the ImportFiles
function due to improper input validation. An attacker can manipulate file paths to access or modify files outside of the intended directories by supplying crafted input.
References
CVSS Scores
version 3.1