Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ncXJxLWo2cG0tOThjMs4AA3w5
External Control of File Name or Path in h2oai/h2o-3
Remote unauthenticated attackers can overwrite arbitrary server files with attacker-controllable data. The data that the attacker can control is not entirely arbitrary. h2o writes a CSV/XLS/etc file to disk, so the attacker data is wrapped in quotations and starts with "C1", if they're exporting as CSV.
Permalink: https://github.com/advisories/GHSA-gqrq-j6pm-98c2JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ncXJxLWo2cG0tOThjMs4AA3w5
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 12 months ago
Updated: 12 months ago
CVSS Score: 9.3
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H
Identifiers: GHSA-gqrq-j6pm-98c2, CVE-2023-6569
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-6569
- https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c
- https://github.com/advisories/GHSA-gqrq-j6pm-98c2
Affected Packages
pypi:h2o
Dependent packages: 14Dependent repositories: 393
Downloads: 229,367 last month
Affected Version Ranges: <= 3.44.0.2
No known fixed version
All affected versions: