CVE-2023-6569: External Control of File Name or Path in h2oai/h2o-3
(updated )
Remote unauthenticated attackers can overwrite arbitrary server files with attacker-controllable data. The data that the attacker can control is not entirely arbitrary. h2o writes a CSV/XLS/etc file to disk, so the attacker data is wrapped in quotations and starts with “C1”, if they’re exporting as CSV.
References
Code Behaviors & Features
Detect and mitigate CVE-2023-6569 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →