H2O.ai H2O vulnerable to deserialization attacks via a JDBC Connection URL
Critical severity
GitHub Reviewed
Published
Sep 6, 2024
to the GitHub Advisory Database
•
Updated Sep 23, 2025
Description
Published by the National Vulnerability Database
Sep 6, 2024
Published to the GitHub Advisory Database
Sep 6, 2024
Reviewed
Sep 23, 2025
Last updated
Sep 23, 2025
H2O.ai H2O through 3.46.0.4 allows attackers to arbitrarily set the JDBC URL, leading to deserialization attacks, file reads, and command execution. Exploitation can occur when an attacker has access to post to the ImportSQLTable URI with a JSON document containing a connection_url property with any typical JDBC Connection URL attack payload such as one that uses queryInterceptors.
References