CVE-2024-51465

IBM App Connect Enterprise Certified Container 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, and 12.3 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request.
References
Link Resource
https://www.ibm.com/support/pages/node/7177814 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:ibm:app_connect_enterprise_certified_container:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:openshift:-:*:*:*:*:*:*:*

History

14 Aug 2025, 01:17

Type Values Removed Values Added
References () https://www.ibm.com/support/pages/node/7177814 - () https://www.ibm.com/support/pages/node/7177814 - Vendor Advisory
Summary
  • (es) IBM App Connect Enterprise Certified Container 11.4, 11.5, 11.6, 12.0, 12.1, 12.2 y 12.3 podría permitir que un atacante remoto autenticado ejecute comandos arbitrarios en el sistema mediante el envío de una solicitud especialmente manipulada.
First Time Redhat
Redhat openshift
Ibm app Connect Enterprise Certified Container
Ibm
CPE cpe:2.3:a:ibm:app_connect_enterprise_certified_container:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:openshift:-:*:*:*:*:*:*:*

Information

Published : 2024-12-04 14:15

Updated : 2025-08-14 01:17


NVD link : CVE-2024-51465

Mitre link : CVE-2024-51465

CVE.ORG link : CVE-2024-51465


JSON object : View

Products Affected

redhat

  • openshift

ibm

  • app_connect_enterprise_certified_container
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')