{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T22:34:59.137","vulnerabilities":[{"cve":{"id":"CVE-2024-51941","sourceIdentifier":"security@apache.org","published":"2025-01-21T22:15:12.447","lastModified":"2025-10-02T01:40:36.760","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A remote code injection vulnerability exists in the Ambari Metrics and \nAMS Alerts feature, allowing authenticated users to inject and execute \narbitrary code. The vulnerability occurs when processing alert \ndefinitions, where malicious input can be injected into the alert script\n execution path. An attacker with authenticated access can exploit this \nvulnerability to execute arbitrary commands on the server. The issue has\n been fixed in the latest versions of Ambari."},{"lang":"es","value":"Existe una vulnerabilidad de inyección de código remoto en la función Ambari Metrics y AMS Alerts, que permite a los usuarios autenticados inyectar y ejecutar código arbitrario. La vulnerabilidad se produce al procesar definiciones de alertas, donde se puede inyectar información maliciosa en la ruta de ejecución de la alerta script. Un atacante con acceso autenticado puede aprovechar esta vulnerabilidad para ejecutar comandos arbitrarios en el servidor. El problema se ha solucionado en las últimas versiones de Ambari."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:ambari:*:*:*:*:*:*:*:*","versionEndIncluding":"2.7.8","matchCriteriaId":"F657FE3D-6887-40EF-91E2-910EE1997D2D"}]}]}],"references":[{"url":"https://lists.apache.org/thread/xq50nlff7o7z1kq3y637clzzl6mjhl8j","source":"security@apache.org","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2025/01/21/9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"]}]}}]}