External Control of File Name or Path Affecting ai.h2o:h2o-core package, versions [,3.46.0.1)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-AIH2O-6125894
  • published 14 Dec 2023
  • disclosed 14 Dec 2023
  • credit Dan McInerney

How to fix?

Upgrade ai.h2o:h2o-core to version 3.46.0.1 or higher.

Overview

Affected versions of this package are vulnerable to External Control of File Name or Path via the ImportFiles function due to improper input validation. An attacker can manipulate file paths to access or modify files outside of the intended directories by supplying crafted input.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
9.3 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Changed
  • Confidentiality (C)
    None
  • Integrity (I)
    Low
  • Availability (A)
    High
Expand this section

NVD

8.2 high