Denial of Service by ReDOS in h2oai/h2o-3
Description
A vulnerability in the /3/ParseSetup endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. This can be exploited by an attacker to cause inefficient regular expression complexity, leading to the exhaustion of server resources and making the server unresponsive.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A vulnerability in h2o-3's /3/ParseSetup endpoint allows denial of service via crafted regular expression leading to resource exhaustion.
Vulnerability
Overview
A denial of service (DoS) vulnerability exists in the /3/ParseSetup endpoint of h2oai/h2o-3 version 3.46.0.1. The endpoint applies a user-specified regular expression to a user-controllable string, allowing an attacker to cause inefficient regular expression complexity (ReDoS) [2]. The vulnerable code is located in ParseSetupHandler.java at line 121 [3].
Exploitation
An attacker can send a crafted POST request to the /3/ParseSetup endpoint with a specially designed regular expression and input string that trigger catastrophic backtracking. No authentication is required for this endpoint, making it accessible to unauthenticated remote attackers [2]. This leads to excessive CPU consumption and memory exhaustion on the server.
Impact
Successful exploitation causes the H2O-3 server to become unresponsive, effectively denying service to legitimate users. This can disrupt machine learning workflows that depend on the platform [1][2].
Mitigation
As of the publication date, a patch has not been released in the latest version. Users are advised to restrict access to the /3/ParseSetup endpoint via network controls or apply any available security updates from the vendor [1][4].
- GitHub - h2oai/h2o-3: H2O is an Open Source, Distributed, Fast & Scalable Machine Learning Platform: Deep Learning, Gradient Boosting (GBM) & XGBoost, Random Forest, Generalized Linear Modeling (GLM with Elastic Net), K-Means, PCA, Generalized Additive Models (GAM), RuleFit, Support Vector Machine (SVM), Stacked Ensembles, Automatic Machine Learning (AutoML), etc.
- NVD - CVE-2024-10550
- h2o-3/h2o-core/src/main/java/water/api/ParseSetupHandler.java at 51c25940ded8b7d0acc8f3f72329fd9dedbb3a34 · h2oai/h2o-3
- The world’s first bug bounty platform for AI/ML
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
h2oPyPI | >= 3.30.0.7, <= 3.46.0.1 | — |
ai.h2o:h2o-coreMaven | >= 3.30.0.7, <= 3.46.0.1 | — |
Affected products
4- ghsa-coords2 versions
>= 3.30.0.7, <= 3.46.0.1+ 1 more
- (no CPE)range: >= 3.30.0.7, <= 3.46.0.1
- (no CPE)range: >= 3.30.0.7, <= 3.46.0.1
- h2oai/h2oai/h2o-3v5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.