A vulnerability in the h2oai/h2o-3 repository allows attackers to exploit deserialization of untrusted data, potentially leading to arbitrary code execution and reading of system files. This issue affects the latest master branch version 3.47.0.99999. The vulnerability arises from the ability to bypass regular expression filters intended to prevent malicious parameter injection in JDBC connections. Attackers can manipulate spaces between parameters to evade detection, allowing for unauthorized file access and code execution. The vulnerability is addressed in version 3.46.0.8.
References
Configurations
No configuration.
History
01 Sep 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-01 06:15
Updated : 2025-09-02 15:55
NVD link : CVE-2025-6507
Mitre link : CVE-2025-6507
CVE.ORG link : CVE-2025-6507
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data