Denial of Service in h2oai/h2o-3
Description
A vulnerability in the typeahead endpoint of h2oai/h2o-3 version 3.46.0 allows for a denial of service. The endpoint performs a HEAD request to verify the existence of a specified resource without setting a timeout. An attacker can exploit this by sending multiple requests to an attacker-controlled server that hangs, causing the application to block and become unresponsive to other requests.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Denial of service in H2O-3's typeahead endpoint due to missing timeout on HEAD requests, allowing attacker to block the application.
Vulnerability
Overview
The typeahead endpoint in H2O-3 version 3.46.0 performs a HEAD request to verify the existence of a specified resource without setting a timeout [2]. This missing timeout allows an attacker to cause a denial of service (DoS) by forcing the application to wait indefinitely for a response from a resource under the attacker's control.
Exploitation
Details
An attacker can exploit this vulnerability by sending multiple requests to the typeahead endpoint that reference an attacker-controlled server configured to hold the connection open indefinitely [2]. Since the HEAD request never completes, the application's worker threads become blocked, consuming resources and preventing the processing of legitimate requests. No authentication is required to reach the endpoint [4].
Impact
A successful attack renders the H2O-3 application unresponsive to legitimate users, resulting in a complete denial of service. The vulnerability is easily exploitable with minimal effort and does not require any special privileges [4].
Mitigation
At the time of publication, no official patch has been released for this vulnerability [1]. Users are advised to restrict network access to the typeahead endpoint, implement external request timeouts, or apply workarounds such as limiting incoming request rates [3]. The code in question is located in PersistManager.java [3].
- GitHub - h2oai/h2o-3: H2O is an Open Source, Distributed, Fast & Scalable Machine Learning Platform: Deep Learning, Gradient Boosting (GBM) & XGBoost, Random Forest, Generalized Linear Modeling (GLM with Elastic Net), K-Means, PCA, Generalized Additive Models (GAM), RuleFit, Support Vector Machine (SVM), Stacked Ensembles, Automatic Machine Learning (AutoML), etc.
- NVD - CVE-2024-8062
- h2o-3/h2o-core/src/main/java/water/persist/PersistManager.java at 047a4d617240a56e74f834207c65973d133391cb · h2oai/h2o-3
- The world’s first bug bounty platform for AI/ML
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
h2oPyPI | >= 3.2.0.1, <= 3.46.0 | — |
ai.h2o:h2o-coreMaven | >= 3.2.0.1, <= 3.46.0 | — |
Affected products
4- ghsa-coords2 versions
>= 3.2.0.1, <= 3.46.0+ 1 more
- (no CPE)range: >= 3.2.0.1, <= 3.46.0
- (no CPE)range: >= 3.2.0.1, <= 3.46.0
- h2oai/h2oai/h2o-3v5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.