Description
A vulnerability has been found in h2oai h2o-3 up to 3.46.08. This affects an unknown function of the file /99/ImportSQLTable of the component H2 JDBC Driver. Such manipulation of the argument connection_url leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine Schwachstelle in h2oai h2o-3 up to 3.46.08 entdeckt. Betroffen hiervon ist ein unbekannter Ablauf der Datei /99/ImportSQLTable der Komponente H2 JDBC Driver. Durch die Manipulation des Arguments connection_url mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgeführt werden. Der Exploit steht zur öffentlichen Verfügung.
Problem types
Product status
Timeline
| 2025-09-21: | Advisory disclosed |
| 2025-09-21: | VulDB entry created |
| 2025-09-21: | VulDB entry last update |
Credits
ez-lbz (VulDB User)
References
github.com/ez-lbz/poc/issues/51
github.com/ez-lbz/poc/issues/51
huntr.com/bounties/4066ce21-7148-44f5-8336-b1674c2f588d
vuldb.com/?id.325125 (VDB-325125 | h2oai h2o-3 H2 JDBC Driver ImportSQLTable deserialization)
vuldb.com/?ctiid.325125 (VDB-325125 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.649728 (Submit #649728 | h2oai h2o-3 <=v3.46.08 Deserialization)
vuldb.com/?submit.649793 (Submit #649793 | h2oai h2o-3 3.46.0.7 Deserialization (Duplicate))
github.com/ez-lbz/poc/issues/51
github.com/ez-lbz/poc/issues/51
huntr.com/bounties/4066ce21-7148-44f5-8336-b1674c2f588d