Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2024-51941

A remote code injection vulnerability exists in the Ambari Metrics and AMS Alerts feature, allowing authenticated users to inject and execute arbitrary code. The vulnerability occurs when processing alert definitions, where malicious input can be injected into the alert script execution path. An attacker with authenticated access can exploit this vulnerability to execute arbitrary commands on the server. The issue has been fixed in the latest versions of Ambari.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 40.1%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2024-51941
  • Apache » Ambari » Version: 0.9
    cpe:2.3:a:apache:ambari:0.9
  • Apache » Ambari » Version: 1.2.0
    cpe:2.3:a:apache:ambari:1.2.0
  • Apache » Ambari » Version: 1.2.1
    cpe:2.3:a:apache:ambari:1.2.1
  • Apache » Ambari » Version: 1.2.2
    cpe:2.3:a:apache:ambari:1.2.2
  • Apache » Ambari » Version: 1.2.3
    cpe:2.3:a:apache:ambari:1.2.3
  • Apache » Ambari » Version: 1.2.4
    cpe:2.3:a:apache:ambari:1.2.4
  • Apache » Ambari » Version: 1.2.5
    cpe:2.3:a:apache:ambari:1.2.5
  • Apache » Ambari » Version: 1.4.0
    cpe:2.3:a:apache:ambari:1.4.0
  • Apache » Ambari » Version: 1.4.1
    cpe:2.3:a:apache:ambari:1.4.1
  • Apache » Ambari » Version: 1.4.2
    cpe:2.3:a:apache:ambari:1.4.2
  • Apache » Ambari » Version: 1.4.3
    cpe:2.3:a:apache:ambari:1.4.3
  • Apache » Ambari » Version: 1.4.4
    cpe:2.3:a:apache:ambari:1.4.4
  • Apache » Ambari » Version: 1.5.0
    cpe:2.3:a:apache:ambari:1.5.0
  • Apache » Ambari » Version: 1.5.1
    cpe:2.3:a:apache:ambari:1.5.1
  • Apache » Ambari » Version: 1.6.0
    cpe:2.3:a:apache:ambari:1.6.0
  • Apache » Ambari » Version: 1.6.1
    cpe:2.3:a:apache:ambari:1.6.1
  • Apache » Ambari » Version: 1.7.0
    cpe:2.3:a:apache:ambari:1.7.0
  • Apache » Ambari » Version: 2.0.0
    cpe:2.3:a:apache:ambari:2.0.0
  • Apache » Ambari » Version: 2.0.1
    cpe:2.3:a:apache:ambari:2.0.1
  • Apache » Ambari » Version: 2.0.2
    cpe:2.3:a:apache:ambari:2.0.2
  • Apache » Ambari » Version: 2.1.0
    cpe:2.3:a:apache:ambari:2.1.0
  • Apache » Ambari » Version: 2.1.1
    cpe:2.3:a:apache:ambari:2.1.1
  • Apache » Ambari » Version: 2.1.2
    cpe:2.3:a:apache:ambari:2.1.2
  • Apache » Ambari » Version: 2.2.0
    cpe:2.3:a:apache:ambari:2.2.0
  • Apache » Ambari » Version: 2.2.1
    cpe:2.3:a:apache:ambari:2.2.1
  • Apache » Ambari » Version: 2.2.2
    cpe:2.3:a:apache:ambari:2.2.2
  • Apache » Ambari » Version: 2.4.0
    cpe:2.3:a:apache:ambari:2.4.0
  • Apache » Ambari » Version: 2.4.1
    cpe:2.3:a:apache:ambari:2.4.1
  • Apache » Ambari » Version: 2.4.2
    cpe:2.3:a:apache:ambari:2.4.2
  • Apache » Ambari » Version: 2.4.3
    cpe:2.3:a:apache:ambari:2.4.3
  • Apache » Ambari » Version: 2.5.0
    cpe:2.3:a:apache:ambari:2.5.0
  • Apache » Ambari » Version: 2.5.1
    cpe:2.3:a:apache:ambari:2.5.1
  • Apache » Ambari » Version: 2.5.2
    cpe:2.3:a:apache:ambari:2.5.2
  • Apache » Ambari » Version: 2.6.0
    cpe:2.3:a:apache:ambari:2.6.0
  • Apache » Ambari » Version: 2.6.1
    cpe:2.3:a:apache:ambari:2.6.1
  • Apache » Ambari » Version: 2.6.2
    cpe:2.3:a:apache:ambari:2.6.2
  • Apache » Ambari » Version: 2.6.2.2
    cpe:2.3:a:apache:ambari:2.6.2.2
  • Apache » Ambari » Version: 2.7.0
    cpe:2.3:a:apache:ambari:2.7.0
  • Apache » Ambari » Version: 2.7.1
    cpe:2.3:a:apache:ambari:2.7.1
  • Apache » Ambari » Version: 2.7.3
    cpe:2.3:a:apache:ambari:2.7.3
  • Apache » Ambari » Version: 2.7.4
    cpe:2.3:a:apache:ambari:2.7.4
  • Apache » Ambari » Version: 2.7.5
    cpe:2.3:a:apache:ambari:2.7.5
  • Apache » Ambari » Version: 2.7.6
    cpe:2.3:a:apache:ambari:2.7.6
  • Apache » Ambari » Version: 2.7.7
    cpe:2.3:a:apache:ambari:2.7.7
  • Apache » Ambari » Version: 2.7.8
    cpe:2.3:a:apache:ambari:2.7.8


Contact Us

Shodan ® - All rights reserved