VYPR
High severityNVD Advisory· Published Mar 20, 2025· Updated Mar 20, 2025

Denial of Service by ReDOS in h2oai/h2o-3

CVE-2024-10550

Description

A vulnerability in the /3/ParseSetup endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. This can be exploited by an attacker to cause inefficient regular expression complexity, leading to the exhaustion of server resources and making the server unresponsive.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A vulnerability in h2o-3's /3/ParseSetup endpoint allows denial of service via crafted regular expression leading to resource exhaustion.

Vulnerability

Overview

A denial of service (DoS) vulnerability exists in the /3/ParseSetup endpoint of h2oai/h2o-3 version 3.46.0.1. The endpoint applies a user-specified regular expression to a user-controllable string, allowing an attacker to cause inefficient regular expression complexity (ReDoS) [2]. The vulnerable code is located in ParseSetupHandler.java at line 121 [3].

Exploitation

An attacker can send a crafted POST request to the /3/ParseSetup endpoint with a specially designed regular expression and input string that trigger catastrophic backtracking. No authentication is required for this endpoint, making it accessible to unauthenticated remote attackers [2]. This leads to excessive CPU consumption and memory exhaustion on the server.

Impact

Successful exploitation causes the H2O-3 server to become unresponsive, effectively denying service to legitimate users. This can disrupt machine learning workflows that depend on the platform [1][2].

Mitigation

As of the publication date, a patch has not been released in the latest version. Users are advised to restrict access to the /3/ParseSetup endpoint via network controls or apply any available security updates from the vendor [1][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
h2oPyPI
>= 3.30.0.7, <= 3.46.0.1
ai.h2o:h2o-coreMaven
>= 3.30.0.7, <= 3.46.0.1

Affected products

4
  • H2oai/H2o 3llm-fuzzy
    Range: = 3.46.0.1
  • ghsa-coords2 versions
    >= 3.30.0.7, <= 3.46.0.1+ 1 more
    • (no CPE)range: >= 3.30.0.7, <= 3.46.0.1
    • (no CPE)range: >= 3.30.0.7, <= 3.46.0.1
  • h2oai/h2oai/h2o-3v5
    Range: unspecified

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.