2025-03-23 03:03:54 +00:00

60 lines
2.2 KiB
JSON

{
"id": "CVE-2024-6854",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:34.377",
"lastModified": "2025-03-20T10:15:34.377",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In h2oai/h2o-3 version 3.46.0, the endpoint for exporting models does not restrict the export location, allowing an attacker to export a model to any file in the server's file structure, thereby overwriting it. This vulnerability can be exploited to overwrite any file on the target server with a trained model file, although the content of the overwrite is not controllable by the attacker."
},
{
"lang": "es",
"value": "En la versi\u00f3n 3.46.0 de h2oai/h2o-3, el endpoint para exportar modelos no restringe la ubicaci\u00f3n de exportaci\u00f3n, lo que permite a un atacante exportar un modelo a cualquier archivo de la estructura de archivos del servidor y, por lo tanto, sobrescribirlo. Esta vulnerabilidad puede explotarse para sobrescribir cualquier archivo del servidor objetivo con un archivo de modelo entrenado, aunque el contenido de la sobrescritura no est\u00e9 bajo el control del atacante."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-36"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/97d013f9-ac51-4c80-8dd7-8dfde11f33b2",
"source": "security@huntr.dev"
}
]
}