Safety vulnerability ID: 65214
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of H2o are vulnerable to External Control of File Name or Path. Remote unauthenticated attackers can overwrite arbitrary server files with attacker-controllable data. The data that the attacker can control is not entirely arbitrary. H2o writes a CSV/XLS/etc file to disk, so the attacker data is wrapped in quotations and starts with "C1", if they're exporting as CSV.
The vulnerable code is found in /h2o/backend/bin/h2o.jar
Latest version: 3.46.0.6
H2O, Fast Scalable Machine Learning, for python
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application