GHSA-gqrq-j6pm-98c2

Suggest an improvement
Source
https://github.com/advisories/GHSA-gqrq-j6pm-98c2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-gqrq-j6pm-98c2/GHSA-gqrq-j6pm-98c2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gqrq-j6pm-98c2
Aliases
Published
2023-12-14T15:30:22Z
Modified
2024-02-16T08:21:49.222961Z
Severity
  • 9.3 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H CVSS Calculator
Summary
External Control of File Name or Path in h2oai/h2o-3
Details

Remote unauthenticated attackers can overwrite arbitrary server files with attacker-controllable data. The data that the attacker can control is not entirely arbitrary. h2o writes a CSV/XLS/etc file to disk, so the attacker data is wrapped in quotations and starts with "C1", if they're exporting as CSV.

Database specific
{
    "nvd_published_at": "2023-12-14T13:15:55Z",
    "cwe_ids": [
        "CWE-610",
        "CWE-73"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2023-12-15T03:12:43Z"
}
References

Affected packages

PyPI / h2o

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
3.44.0.2

Affected versions

3.*

3.10.0.3
3.10.0.6
3.10.0.7
3.10.0.8
3.10.0.10
3.10.3.3
3.10.3.4
3.10.4.1
3.10.4.2
3.10.4.3
3.10.4.4
3.10.4.6
3.10.4.8
3.16.0.1
3.16.0.2
3.16.0.3
3.16.0.4
3.18.0.1
3.18.0.2
3.18.0.3
3.18.0.4
3.18.0.5
3.18.0.6
3.18.0.7
3.18.0.8
3.18.0.9
3.18.0.10
3.18.0.11
3.20.0.4
3.20.0.5
3.20.0.6
3.20.0.7
3.20.0.8
3.22.0.1
3.22.0.2
3.22.0.3
3.22.0.4
3.22.0.5
3.22.1.1
3.22.1.2
3.22.1.3
3.22.1.4
3.22.1.5
3.22.1.6
3.24.0.1
3.24.0.2
3.24.0.3
3.24.0.4
3.24.0.5
3.26.0.1
3.26.0.2
3.26.0.3
3.26.0.4
3.26.0.5
3.26.0.6
3.26.0.8
3.26.0.9
3.26.0.10
3.26.0.11
3.28.0.1
3.28.0.2
3.28.0.3
3.28.1.2
3.28.1.3
3.30.0.1
3.30.0.2
3.30.0.3
3.30.0.4
3.30.0.5
3.30.0.6
3.30.0.7
3.30.1.1
3.30.1.2
3.30.1.3
3.32.0.2
3.32.0.3
3.32.0.4
3.32.0.5
3.32.1.1
3.32.1.2
3.32.1.3
3.32.1.4
3.32.1.5
3.32.1.6
3.32.1.7
3.34.0.3
3.34.0.7
3.34.0.8
3.36.0.2
3.36.0.3
3.36.0.4
3.36.1.1
3.36.1.2
3.36.1.3
3.36.1.4
3.36.1.5
3.38.0.1
3.38.0.2
3.38.0.3
3.38.0.4
3.40.0.1
3.40.0.2
3.40.0.3
3.40.0.4
3.42.0.1
3.42.0.2
3.42.0.3
3.42.0.4
3.44.0.1
3.44.0.2