CVE-2024-6960

The H2O machine learning platform uses "Iced" classes as the primary means of moving Java Objects around the cluster. The Iced format supports inclusion of serialized Java objects. When a model is deserialized, any class is allowed to be deserialized (no class whitelist). An attacker can construct a crafted Iced model that uses Java gadgets and leads to arbitrary code execution when imported to the H2O platform.
CVSS

No CVSS.

Configurations

No configuration.

History

25 Nov 2024, 13:15

Type Values Removed Values Added
CWE CWE-502
References
  • () https://mvnrepository.com/artifact/ai.h2o/h2o-coreĀ -

21 Jul 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-21 10:15

Updated : 2024-11-25 13:15


NVD link : CVE-2024-6960

Mitre link : CVE-2024-6960


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data