Vulnerability Description
A vulnerability in the `/3/Parse` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint uses a user-specified string to construct a regular expression, which is then applied to another user-specified string. By sending multiple simultaneous requests, an attacker can exhaust all available threads, leading to a complete denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| H2O | H2O | 3.46.0.1 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/ce7bd2d6-fd38-440d-a91a-dd8f3fc06bc2ExploitThird Party Advisory
FAQ
What is CVE-2024-10549?
CVE-2024-10549 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability in the `/3/Parse` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint uses a user-specified string to construct a regular expression, whi...
How severe is CVE-2024-10549?
CVE-2024-10549 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-10549?
Check the references section above for vendor advisories and patch information. Affected products include: H2O H2O.