H2O-3 Arbitrary File Overwrite (CVE-2024-6854)

critical Nessus Plugin ID 213042

Synopsis

A Python library installed on the remote host is affected by a vulnerability.

Description

An arbitrary file overwrite vulnerability exists in H2O-3. The endpoint that allows for exporting models & does not limit where models can be exported to. As such an attacker can export a model to any file in the server file structure, overwriting it, by simply using the force flag.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

This vulnerability is currently not fixed. Fix the code manually or monitor new releases for a fix.

See Also

http://www.nessus.org/u?38d3453f

http://www.nessus.org/u?af873332

Plugin Details

Severity: Critical

ID: 213042

File Name: h2o3_CVE-2024-6854.nasl

Version: 1.2

Type: local

Agent: windows, macosx, unix

Published: 12/16/2024

Updated: 12/17/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-6854

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:h2o:h2o:3

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/17/2024

Reference Information

CVE: CVE-2024-6854