CVE-2024-5979: CWE-94 Improper Control of Generation of Code in h2oai h2oai/h2o-3
In h2oai/h2o-3 version 3.46.0, the `run_tool` command in the `rapids` component allows the `main` function of any class under the `water.tools` namespace to be called. One such class, `MojoConvertTool`, crashes the server when invoked with an invalid argument, causing a denial of service.
AI Analysis
Technical Summary
CVE-2024-5979 is a vulnerability identified in the h2oai/h2o-3 open-source machine learning platform, specifically in version 3.46.0. The issue resides in the `rapids` component's `run_tool` command, which improperly allows execution of the `main` function of any class within the `water.tools` namespace. This lack of proper control or validation over which classes can be invoked leads to a security flaw categorized under CWE-94 (Improper Control of Generation of Code). One exploitable instance is the `MojoConvertTool` class, which, when called with invalid arguments, causes the server hosting the h2o-3 service to crash, resulting in a denial of service (DoS) condition. The vulnerability has a CVSS v3.0 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. This means an unauthenticated attacker can remotely trigger the DoS without needing user interaction. While no public exploits are reported yet, the vulnerability poses a significant risk to service availability, especially in environments relying on h2o-3 for critical AI or data processing workloads. The affected versions are unspecified beyond 3.46.0, so users should assume all versions up to and including 3.46.0 are vulnerable until patched. The root cause is insufficient validation or restriction on which classes can be executed via the `run_tool` command, allowing unintended code execution paths that lead to crashes. This vulnerability highlights the importance of strict input validation and access controls in components that dynamically invoke code based on user input.
Potential Impact
For European organizations, the primary impact of CVE-2024-5979 is the potential for denial of service attacks against systems running h2oai/h2o-3, which could disrupt AI and machine learning workflows critical to business operations. This can lead to downtime, loss of productivity, and potential financial losses, especially in sectors relying heavily on data analytics and AI, such as finance, healthcare, manufacturing, and telecommunications. Since the vulnerability does not affect confidentiality or integrity, data breaches or data manipulation risks are low. However, service unavailability can degrade trust and operational continuity. Organizations using h2o-3 in cloud or on-premises environments exposed to untrusted networks are particularly at risk. The ease of remote exploitation without authentication increases the threat level, making it feasible for attackers to cause disruption without insider access. Additionally, denial of service conditions could be leveraged as part of multi-stage attacks or to distract security teams. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the urgency for mitigation given the high CVSS score and straightforward attack vector.
Mitigation Recommendations
To mitigate CVE-2024-5979, European organizations should: 1) Immediately assess and inventory all deployments of h2oai/h2o-3 to identify affected versions, prioritizing version 3.46.0 and earlier. 2) Apply vendor patches or updates as soon as they become available; if no patch exists yet, consider upgrading to a later secure version once released. 3) Restrict network access to the `run_tool` command interface by implementing firewall rules, network segmentation, or VPN access to limit exposure to trusted users only. 4) Implement input validation and sanitization controls to prevent invalid arguments from reaching the `MojoConvertTool` or other classes invoked via `run_tool`. 5) Monitor logs and system behavior for unusual or repeated invocations of the `run_tool` command, especially calls to `MojoConvertTool` with malformed parameters, to detect potential exploitation attempts early. 6) Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to block suspicious requests targeting this functionality. 7) Educate development and operations teams about the risks of dynamic code invocation and enforce secure coding practices to prevent similar vulnerabilities. 8) Establish incident response plans to quickly respond to any denial of service incidents involving h2o-3 services.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Belgium
CVE-2024-5979: CWE-94 Improper Control of Generation of Code in h2oai h2oai/h2o-3
Description
In h2oai/h2o-3 version 3.46.0, the `run_tool` command in the `rapids` component allows the `main` function of any class under the `water.tools` namespace to be called. One such class, `MojoConvertTool`, crashes the server when invoked with an invalid argument, causing a denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2024-5979 is a vulnerability identified in the h2oai/h2o-3 open-source machine learning platform, specifically in version 3.46.0. The issue resides in the `rapids` component's `run_tool` command, which improperly allows execution of the `main` function of any class within the `water.tools` namespace. This lack of proper control or validation over which classes can be invoked leads to a security flaw categorized under CWE-94 (Improper Control of Generation of Code). One exploitable instance is the `MojoConvertTool` class, which, when called with invalid arguments, causes the server hosting the h2o-3 service to crash, resulting in a denial of service (DoS) condition. The vulnerability has a CVSS v3.0 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. This means an unauthenticated attacker can remotely trigger the DoS without needing user interaction. While no public exploits are reported yet, the vulnerability poses a significant risk to service availability, especially in environments relying on h2o-3 for critical AI or data processing workloads. The affected versions are unspecified beyond 3.46.0, so users should assume all versions up to and including 3.46.0 are vulnerable until patched. The root cause is insufficient validation or restriction on which classes can be executed via the `run_tool` command, allowing unintended code execution paths that lead to crashes. This vulnerability highlights the importance of strict input validation and access controls in components that dynamically invoke code based on user input.
Potential Impact
For European organizations, the primary impact of CVE-2024-5979 is the potential for denial of service attacks against systems running h2oai/h2o-3, which could disrupt AI and machine learning workflows critical to business operations. This can lead to downtime, loss of productivity, and potential financial losses, especially in sectors relying heavily on data analytics and AI, such as finance, healthcare, manufacturing, and telecommunications. Since the vulnerability does not affect confidentiality or integrity, data breaches or data manipulation risks are low. However, service unavailability can degrade trust and operational continuity. Organizations using h2o-3 in cloud or on-premises environments exposed to untrusted networks are particularly at risk. The ease of remote exploitation without authentication increases the threat level, making it feasible for attackers to cause disruption without insider access. Additionally, denial of service conditions could be leveraged as part of multi-stage attacks or to distract security teams. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the urgency for mitigation given the high CVSS score and straightforward attack vector.
Mitigation Recommendations
To mitigate CVE-2024-5979, European organizations should: 1) Immediately assess and inventory all deployments of h2oai/h2o-3 to identify affected versions, prioritizing version 3.46.0 and earlier. 2) Apply vendor patches or updates as soon as they become available; if no patch exists yet, consider upgrading to a later secure version once released. 3) Restrict network access to the `run_tool` command interface by implementing firewall rules, network segmentation, or VPN access to limit exposure to trusted users only. 4) Implement input validation and sanitization controls to prevent invalid arguments from reaching the `MojoConvertTool` or other classes invoked via `run_tool`. 5) Monitor logs and system behavior for unusual or repeated invocations of the `run_tool` command, especially calls to `MojoConvertTool` with malformed parameters, to detect potential exploitation attempts early. 6) Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to block suspicious requests targeting this functionality. 7) Educate development and operations teams about the risks of dynamic code invocation and enforce secure coding practices to prevent similar vulnerabilities. 8) Establish incident response plans to quickly respond to any denial of service incidents involving h2o-3 services.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-06-13T17:38:41.146Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2a178f764e1f470d01
Added to database: 10/15/2025, 1:01:30 PM
Last enriched: 10/15/2025, 1:45:18 PM
Last updated: 10/16/2025, 12:39:01 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.