Home » Database

AVID-2026-R1593

Description

Arbitrary File Overwrite in h2oai/h2o-3 (CVE-2024-6854)

Details

In h2oai/h2o-3 version 3.46.0, the endpoint for exporting models does not restrict the export location, allowing an attacker to export a model to any file in the server’s file structure, thereby overwriting it. This vulnerability can be exploited to overwrite any file on the target server with a trained model file, although the content of the overwrite is not controllable by the attacker.

Reason for inclusion in AVID: CVE-2024-6854 describes an arbitrary file overwrite vulnerability in h2o-3’s model export endpoint. This is a software vulnerability in an AI framework/component used to train/deploy AI models, enabling file system tampering on the AI deployment stack. It affects software supply chain components (AI software libraries/serving stacks) and has clear security impact. Evidence is provided by the CVE/NVD entry and details.

References

Affected or Relevant Artifacts

  • Developer: h2oai
  • Deployer: h2oai
  • Artifact Details:
TypeName
Systemh2oai/h2o-3

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
Base Score7.1
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity Impact🟢 Low
Availability Impact🔴 High

CWE

IDDescription
CWE-36CWE-36 Absolute Path Traversal

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry