Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. h2o
  4. ›
  5. CVE-2024-45758

CVE-2024-45758: H2O.ai H2O vulnerable to deserialization attacks via a JDBC Connection URL

September 6, 2024 (updated September 23, 2025)

H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.

References

  • gist.github.com/AfterSnows/c24ca3c26dc89ab797e610e92a6a9acb
  • github.com/advisories/GHSA-hrmc-jmp7-mpm2
  • github.com/h2oai/h2o-3
  • github.com/h2oai/h2o-3/commit/f714edd6b8429c7a7211b779b6ec108a95b7382d
  • github.com/h2oai/h2o-3/issues/16425
  • github.com/h2oai/h2o-3/issues/16622
  • github.com/h2oai/h2o-3/pull/16624
  • nvd.nist.gov/vuln/detail/CVE-2024-45758
  • spear-shield.notion.site/Unauthenticated-Remote-Code-Execution-via-Unrestricted-JDBC-Connection-87a958a4874044199cbb86422d1f6068

Code Behaviors & Features

Detect and mitigate CVE-2024-45758 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 3.46.0.7

Solution

Unfortunately, there is no solution available yet.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

pypi/h2o/CVE-2024-45758.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 25 Sep 2025 12:20:27 +0000.