Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. h2o
  4. ›
  5. CVE-2024-5550

CVE-2024-5550: Arbitrary system path lookup in h20

June 6, 2024

In h2oai/h2o-3 version 3.40.0.4, an exposure of sensitive information vulnerability exists due to an arbitrary system path lookup feature. This vulnerability allows any remote user to view full paths in the entire file system where h2o-3 is hosted. Specifically, the issue resides in the Typeahead API call, which when requested with a typeahead lookup of ‘/’, exposes the root filesystem including directories such as /home, /usr, /bin, among others. This vulnerability could allow attackers to explore the entire filesystem, and when combined with a Local File Inclusion (LFI) vulnerability, could make exploitation of the server trivial.

References

  • github.com/advisories/GHSA-x234-r5fg-x52m
  • github.com/h2oai/h2o-3
  • huntr.com/bounties/e76372c2-39be-4984-a7c8-7048a75a25dc
  • nvd.nist.gov/vuln/detail/CVE-2024-5550

Code Behaviors & Features

Detect and mitigate CVE-2024-5550 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 3.40.0.4

Solution

Unfortunately, there is no solution available yet.

Impact 5.3 MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Source file

pypi/h2o/CVE-2024-5550.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:05 +0000.