A vulnerability in the typeahead endpoint of h2oai/h2o-3 version 3.46.0 allows for a denial of service. The endpoint performs a `HEAD` request to verify the existence of a specified resource without setting a timeout. An attacker can exploit this by sending multiple requests to an attacker-controlled server that hangs, causing the application to block and become unresponsive to other requests.
References
| Link | Resource |
|---|---|
| https://huntr.com/bounties/a04190d9-4acb-449a-9a7f-f1bf6be1ed23 | Exploit Third Party Advisory |
| https://huntr.com/bounties/a04190d9-4acb-449a-9a7f-f1bf6be1ed23 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-03-20 10:15
Updated : 2025-03-26 16:10
NVD link : CVE-2024-8062
Mitre link : CVE-2024-8062
CVE.ORG link : CVE-2024-8062
JSON object : View
Products Affected
h2o
- h2o
CWE
CWE-1088
Synchronous Access of Remote Resource without Timeout
