Home » Database

AVID-2026-R1322

Description

H2O Remote Code Execution via POJO Model Import (CVE-2023-6016)

Details

An attacker is able to gain remote code execution on a server hosting the H2O dashboard through it’s POJO model import feature.

Reason for inclusion in AVID: CVE-2023-6016 describes a remote code execution vulnerability in H2O’s POJO model import feature. H2O-3 is a general-purpose machine learning platform used for building, deploying, and serving AI models. A remote attacker could execute arbitrary code on a server hosting the H2O dashboard, representing a security/safety vulnerability within AI software stack. This vulnerability affects AI pipelines and deployment components, i.e., the supply chain of general-purpose AI systems. Evidence includes CVSS v3.0 base score 10 (CRITICAL), CWE-94, and official CVE/NVD references.

References

Affected or Relevant Artifacts

  • Developer: h2oai
  • Deployer: h2oai
  • Artifact Details:
TypeName
Systemh2oai/h2o-3

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score10.0
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-94CWE-94 Improper Control of Generation of Code

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2023-11-16
  • Version: 0.3.3
  • AVID Entry