### [CVE-2024-31903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31903) ![](https://img.shields.io/static/v1?label=Product&message=Sterling%20B2B%20Integrator%20Standard%20Edition&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=6.0.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.2.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brightgreen) ### Description IBM Sterling B2B Integrator Standard EditionĀ 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 allow an attacker on the local network to execute arbitrary code on the system, caused by the deserialization of untrusted data. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ReversecLabs/ibm-sterling-b2b-integrator-poc - https://github.com/WithSecureLabs/ibm-sterling-b2b-integrator-poc - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/plzheheplztrying/cve_monitor