CVE-2024-6863

In h2oai/h2o-3 version 3.46.0, an endpoint exposing a custom EncryptionTool allows an attacker to encrypt any files on the target server with a key of their choosing. The chosen key can also be overwritten, resulting in ransomware-like behavior. This vulnerability makes it possible for an attacker to encrypt arbitrary files with keys of their choice, making it exceedingly difficult for the target to recover the keys needed for decryption.
CVSS

No CVSS.

References
Link Resource
https://huntr.com/bounties/10f55937-0cba-4530-897f-2abf30ed5270 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:h2o:h2o:3.46.0:*:*:*:*:*:*:*

History

15 Jul 2025, 15:52

Type Values Removed Values Added
First Time H2o
H2o h2o
References () https://huntr.com/bounties/10f55937-0cba-4530-897f-2abf30ed5270 - () https://huntr.com/bounties/10f55937-0cba-4530-897f-2abf30ed5270 - Exploit, Third Party Advisory
CPE cpe:2.3:a:h2o:h2o:3.46.0:*:*:*:*:*:*:*

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-15 15:52


NVD link : CVE-2024-6863

Mitre link : CVE-2024-6863


JSON object : View

Products Affected

h2o

  • h2o
CWE
CWE-749

Exposed Dangerous Method or Function