First published: Thu Aug 22 2024(Updated: )
IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sterling Connect:Direct | <=6.3.0 | |
IBM Sterling Connect:Direct | <=6.1.0 | |
IBM Sterling Connect:Direct | <=6.2.0 | |
IBM Sterling Connect:Direct | <=6.0 | |
All of | ||
Any of | ||
IBM Sterling Connect:Direct | =6.0 | |
IBM Sterling Connect:Direct | =6.1.0 | |
IBM Sterling Connect:Direct | =6.2.0 | |
IBM Sterling Connect:Direct | =6.3.0 | |
Any of | ||
IBM AIX | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39744 is classified as a moderate severity vulnerability due to the potential for cross-site request forgery attacks.
To remediate CVE-2024-39744, update IBM Sterling Connect:Direct Web Services to the latest version available.
CVE-2024-39744 affects IBM Sterling Connect:Direct Web Services versions 6.0, 6.1, 6.2, and 6.3.
CVE-2024-39744 is a cross-site request forgery (CSRF) vulnerability.
The vendor associated with CVE-2024-39744 is IBM.