Safety vulnerability ID: 76212
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In h2oai/h2o-3 version 3.46.0, the /99/Models/{name}/json endpoint allows for arbitrary file overwrite on the target server. The vulnerability arises from the exportModelDetails function in ModelsHandler.java, where the user-controllable mexport.dir parameter is used to specify the file path for writing model details. This can lead to overwriting files at arbitrary locations on the host system.
Latest version: 3.46.0.7
H2O, Fast Scalable Machine Learning, for python
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application