CVE-2024-6960
HIGHAi.h2o H2o-core - Insecure Deserialization
Title source: ruleDescription
The H2O machine learning platform uses "Iced" classes as the primary means of moving Java Objects around the cluster. The Iced format supports inclusion of serialized Java objects. When a model is deserialized, any class is allowed to be deserialized (no class whitelist). An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform.
Scores
CVSS v3
7.5
EPSS
0.0024
EPSS Percentile
47.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Classification
CWE
CWE-502
Status
draft
Affected Products (1)
ai.h2o/h2o-core
Maven
Timeline
Published
Jul 21, 2024
Tracked Since
Feb 18, 2026