Description
The H2O machine learning platform uses "Iced" classes as the primary means of moving Java Objects around the cluster. The Iced format supports inclusion of serialized Java objects. When a model is deserialized, any class is allowed to be deserialized (no class whitelist). An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform.
Published: 2024-07-21
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2430 The H2O machine learning platform uses "Iced" classes as the primary means of moving Java Objects around the cluster. The Iced format supports inclusion of serialized Java objects. When a model is deserialized, any class is allowed to be deserialized (no class whitelist). An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform.
Github GHSA Github GHSA GHSA-w36w-948j-xhfw H2O vulnerable to Deserialization of Untrusted Data
History

No history.

Subscriptions

Mvnrepository H2o-core
cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-11-25T12:47:17.311Z

Reserved: 2024-07-21T06:38:54.536Z

Link: CVE-2024-6960

cve-icon Vulnrichment

Updated: 2024-08-01T21:45:38.400Z

cve-icon NVD

Status : Deferred

Published: 2024-07-21T10:15:04.497

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-6960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses