CVE-2024-5986: CWE-73 External Control of File Name or Path in h2oai h2oai/h2o-3
A vulnerability in h2oai/h2o-3 version 3.46.0.1 allows remote attackers to write arbitrary data to any file on the server. This is achieved by exploiting the `/3/Parse` endpoint to inject attacker-controlled data as the header of an empty file, which is then exported using the `/3/Frames/framename/export` endpoint. The impact of this vulnerability includes the potential for remote code execution and complete access to the system running h2o-3, as attackers can overwrite critical files such as private SSH keys or script files.
AI Analysis
Technical Summary
CVE-2024-5986 is a critical security vulnerability identified in the h2oai/h2o-3 software, specifically version 3.46.0.1. The vulnerability arises from improper external control of file names or paths (CWE-73), allowing remote attackers to write arbitrary data to any file on the server hosting the application. The attack vector involves two endpoints: first, the attacker sends malicious data to the /3/Parse endpoint, which injects attacker-controlled content as the header of an empty file. Then, the attacker triggers the /3/Frames/framename/export endpoint to export this file, effectively writing arbitrary data to a file path of their choosing. This can lead to overwriting critical files such as private SSH keys, system scripts, or configuration files, enabling remote code execution and full system compromise. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, making it highly dangerous. The CVSS v3.0 score of 9.1 reflects the ease of exploitation and the critical impact on system integrity and availability. Although no public exploits have been reported yet, the vulnerability's nature makes it a prime target for attackers aiming to gain persistent access or disrupt services. The lack of available patches at the time of reporting increases the urgency for organizations to implement interim mitigations. This vulnerability affects any deployment of h2o-3 version 3.46.0.1 or potentially other unspecified versions, especially in environments where the application is exposed to untrusted networks or users.
Potential Impact
For European organizations, the impact of CVE-2024-5986 is significant. Organizations using h2o-3 for AI model training, data analytics, or machine learning workloads could face complete system compromise if exploited. Confidentiality is at risk as attackers can overwrite private keys and sensitive files, potentially leading to unauthorized data access or lateral movement within networks. Integrity is severely impacted because critical system and application files can be altered or replaced, undermining trust in the affected systems. Availability is also threatened since attackers could disrupt services by corrupting essential files or deploying malicious scripts. The risk is heightened for sectors with critical infrastructure dependencies, such as finance, healthcare, energy, and government, where AI tools like h2o-3 are increasingly integrated. The vulnerability's remote and unauthenticated nature means attackers can exploit it without prior access, increasing the attack surface. The absence of known exploits currently provides a narrow window for proactive defense, but the critical severity demands immediate attention to avoid potential widespread exploitation.
Mitigation Recommendations
Given the absence of an official patch at the time of reporting, European organizations should implement the following specific mitigations: 1) Restrict network access to the h2o-3 service endpoints, especially /3/Parse and /3/Frames/framename/export, using firewalls or network segmentation to limit exposure to trusted users only. 2) Employ strict input validation and sanitization at the application layer to detect and block malicious payloads attempting to manipulate file paths or inject arbitrary data. 3) Monitor logs and network traffic for unusual activity related to file exports or unexpected file modifications, enabling early detection of exploitation attempts. 4) Use application-layer proxies or web application firewalls (WAFs) configured with custom rules to block suspicious requests targeting vulnerable endpoints. 5) Isolate h2o-3 deployments in containerized or sandboxed environments to limit the blast radius in case of compromise. 6) Regularly back up critical configuration and key files, ensuring rapid recovery if files are overwritten. 7) Stay informed on vendor advisories and apply patches immediately once available. 8) Conduct penetration testing and vulnerability assessments focused on h2o-3 to identify exposure and verify mitigation effectiveness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2024-5986: CWE-73 External Control of File Name or Path in h2oai h2oai/h2o-3
Description
A vulnerability in h2oai/h2o-3 version 3.46.0.1 allows remote attackers to write arbitrary data to any file on the server. This is achieved by exploiting the `/3/Parse` endpoint to inject attacker-controlled data as the header of an empty file, which is then exported using the `/3/Frames/framename/export` endpoint. The impact of this vulnerability includes the potential for remote code execution and complete access to the system running h2o-3, as attackers can overwrite critical files such as private SSH keys or script files.
AI-Powered Analysis
Technical Analysis
CVE-2024-5986 is a critical security vulnerability identified in the h2oai/h2o-3 software, specifically version 3.46.0.1. The vulnerability arises from improper external control of file names or paths (CWE-73), allowing remote attackers to write arbitrary data to any file on the server hosting the application. The attack vector involves two endpoints: first, the attacker sends malicious data to the /3/Parse endpoint, which injects attacker-controlled content as the header of an empty file. Then, the attacker triggers the /3/Frames/framename/export endpoint to export this file, effectively writing arbitrary data to a file path of their choosing. This can lead to overwriting critical files such as private SSH keys, system scripts, or configuration files, enabling remote code execution and full system compromise. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, making it highly dangerous. The CVSS v3.0 score of 9.1 reflects the ease of exploitation and the critical impact on system integrity and availability. Although no public exploits have been reported yet, the vulnerability's nature makes it a prime target for attackers aiming to gain persistent access or disrupt services. The lack of available patches at the time of reporting increases the urgency for organizations to implement interim mitigations. This vulnerability affects any deployment of h2o-3 version 3.46.0.1 or potentially other unspecified versions, especially in environments where the application is exposed to untrusted networks or users.
Potential Impact
For European organizations, the impact of CVE-2024-5986 is significant. Organizations using h2o-3 for AI model training, data analytics, or machine learning workloads could face complete system compromise if exploited. Confidentiality is at risk as attackers can overwrite private keys and sensitive files, potentially leading to unauthorized data access or lateral movement within networks. Integrity is severely impacted because critical system and application files can be altered or replaced, undermining trust in the affected systems. Availability is also threatened since attackers could disrupt services by corrupting essential files or deploying malicious scripts. The risk is heightened for sectors with critical infrastructure dependencies, such as finance, healthcare, energy, and government, where AI tools like h2o-3 are increasingly integrated. The vulnerability's remote and unauthenticated nature means attackers can exploit it without prior access, increasing the attack surface. The absence of known exploits currently provides a narrow window for proactive defense, but the critical severity demands immediate attention to avoid potential widespread exploitation.
Mitigation Recommendations
Given the absence of an official patch at the time of reporting, European organizations should implement the following specific mitigations: 1) Restrict network access to the h2o-3 service endpoints, especially /3/Parse and /3/Frames/framename/export, using firewalls or network segmentation to limit exposure to trusted users only. 2) Employ strict input validation and sanitization at the application layer to detect and block malicious payloads attempting to manipulate file paths or inject arbitrary data. 3) Monitor logs and network traffic for unusual activity related to file exports or unexpected file modifications, enabling early detection of exploitation attempts. 4) Use application-layer proxies or web application firewalls (WAFs) configured with custom rules to block suspicious requests targeting vulnerable endpoints. 5) Isolate h2o-3 deployments in containerized or sandboxed environments to limit the blast radius in case of compromise. 6) Regularly back up critical configuration and key files, ensuring rapid recovery if files are overwritten. 7) Stay informed on vendor advisories and apply patches immediately once available. 8) Conduct penetration testing and vulnerability assessments focused on h2o-3 to identify exposure and verify mitigation effectiveness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-06-13T18:37:40.863Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 698083b8f9fa50a62f37058f
Added to database: 2/2/2026, 11:00:08 AM
Last enriched: 2/2/2026, 11:14:48 AM
Last updated: 3/19/2026, 4:59:55 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.