CVE-2023-51389

Hertzbeat is a real-time monitoring system. At the interface of `/define/yml`, SnakeYAML is used as a parser to parse yml content, but no security configuration is used, resulting in a YAML deserialization vulnerability. Version 1.4.1 fixes this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*

History

16 Jan 2025, 19:08

Type Values Removed Values Added
References () https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17 - () https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17 - Patch
References () https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96 - () https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96 - Exploit, Vendor Advisory
First Time Apache
Apache hertzbeat
CPE cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*

Information

Published : 2024-02-22 16:15

Updated : 2025-01-16 19:08


NVD link : CVE-2023-51389

Mitre link : CVE-2023-51389

CVE.ORG link : CVE-2023-51389


JSON object : View

Products Affected

apache

  • hertzbeat
CWE
CWE-502

Deserialization of Untrusted Data