A vulnerability in the `/3/ImportFiles` endpoint of h2oai/h2o-3 version 3.46.1 allows an attacker to cause a denial of service. The endpoint takes a single GET parameter, `path`, which can be recursively set to reference itself. This leads the server to repeatedly call its own endpoint, eventually filling up the request queue and leaving the server unable to handle other requests.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://huntr.com/bounties/3fe640df-bef4-4072-8890-0d12bc2818f6 | third party advisory exploit |