Home ยป Database

AVID-2026-R1533

Description

Vulnerability CVE-2024-45758

Details

H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.

Reason for inclusion in AVID: The CVE describes a vulnerability in H2O.ai H2O (an ML/AI platform) that allows deserialization-based arbitrary code execution via an unsecured JDBC URL, affecting file reads and command execution. H2O is a component commonly used in AI model training, serving, and data pipelines, meaning this vulnerability can impact AI software stacks and their dependencies. As such, it is a software supply-chain issue within general-purpose AI systems and poses a security risk. The CVE description provides explicit exploitation and impact signals, supporting its inclusion in AVID curation.

References

Affected or Relevant Artifacts

  • Developer: n/a
  • Deployer: n/a
  • Artifact Details:
TypeName
Systemn/a

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-09-06
  • Version: 0.3.3
  • AVID Entry