Hertzbeat is a real-time monitoring system. At the interface of `/define/yml`, SnakeYAML is used as a parser to parse yml content, but no security configuration is used, resulting in a YAML deserialization vulnerability. Version 1.4.1 fixes this vulnerability.
References
Configurations
History
16 Jan 2025, 19:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17 - Patch | |
References | () https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96 - Exploit, Vendor Advisory | |
First Time |
Apache
Apache hertzbeat |
|
CPE | cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:* |
Information
Published : 2024-02-22 16:15
Updated : 2025-01-16 19:08
NVD link : CVE-2023-51389
Mitre link : CVE-2023-51389
CVE.ORG link : CVE-2023-51389
JSON object : View
Products Affected
apache
- hertzbeat
CWE
CWE-502
Deserialization of Untrusted Data