AVID-2026-R1593
Description
Arbitrary File Overwrite in h2oai/h2o-3 (CVE-2024-6854)
Details
In h2oai/h2o-3 version 3.46.0, the endpoint for exporting models does not restrict the export location, allowing an attacker to export a model to any file in the server’s file structure, thereby overwriting it. This vulnerability can be exploited to overwrite any file on the target server with a trained model file, although the content of the overwrite is not controllable by the attacker.
Reason for inclusion in AVID: CVE-2024-6854 describes an arbitrary file overwrite vulnerability in h2o-3’s model export endpoint. This is a software vulnerability in an AI framework/component used to train/deploy AI models, enabling file system tampering on the AI deployment stack. It affects software supply chain components (AI software libraries/serving stacks) and has clear security impact. Evidence is provided by the CVE/NVD entry and details.
References
Affected or Relevant Artifacts
- Developer: h2oai
- Deployer: h2oai
- Artifact Details:
| Type | Name |
|---|---|
| System | h2oai/h2o-3 |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H |
| Base Score | 7.1 |
| Base Severity | 🔴 High |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | 🟢 Low |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | 🟢 Low |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-36 | CWE-36 Absolute Path Traversal |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2025-03-20
- Version: 0.3.3
- AVID Entry