CVE-2023-51387

Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in version 1.4.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*

History

28 Aug 2024, 15:44

Type Values Removed Values Added
CPE cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:* cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*
First Time Apache
Apache hertzbeat

03 Jan 2024, 17:43

Type Values Removed Values Added
References () https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2 - () https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2 - Patch
References () https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj - () https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj - Exploit, Vendor Advisory
References () https://github.com/dromara/hertzbeat/blob/6b599495763120ad1df6f4ed4b6713bb4885d8e2/home/blog/2023-09-26-hertzbeat-v1.4.1.md - () https://github.com/dromara/hertzbeat/blob/6b599495763120ad1df6f4ed4b6713bb4885d8e2/home/blog/2023-09-26-hertzbeat-v1.4.1.md - Release Notes
First Time Dromara
Dromara hertzbeat
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*

22 Dec 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-22 21:15

Updated : 2024-08-28 15:44


NVD link : CVE-2023-51387

Mitre link : CVE-2023-51387

CVE.ORG link : CVE-2023-51387


JSON object : View

Products Affected

apache

  • hertzbeat
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')