Home » Database

AVID-2026-R1623

Description

Arbitrary File Overwrite in h2oai/h2o-3 (CVE-2024-8616)

Details

In h2oai/h2o-3 version 3.46.0, the /99/Models/{name}/json endpoint allows for arbitrary file overwrite on the target server. The vulnerability arises from the exportModelDetails function in ModelsHandler.java, where the user-controllable mexport.dir parameter is used to specify the file path for writing model details. This can lead to overwriting files at arbitrary locations on the host system.

Reason for inclusion in AVID: CVE-2024-8616 describes an arbitrary file overwrite vulnerability in h2oai/h2o-3 via a user-controllable file path in an endpoint used in AI model serving. This concerns AI software stacks and ML pipelines, is in a software component used to build/run general-purpose AI systems, constitutes a security vulnerability (CWE-73, high CVSS), and the report provides explicit details (affected version, endpoint, parameter, exploit path). Therefore suitable for AVID curation.

References

Affected or Relevant Artifacts

  • Developer: h2oai
  • Deployer: h2oai
  • Artifact Details:
TypeName
Systemh2oai/h2o-3

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Base Score8.2
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity Impact🟢 Low
Availability Impact🔴 High

CWE

IDDescription
CWE-73CWE-73 External Control of File Name or Path

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry