CVE-2023-51387

Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in version 1.4.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:38

Type Values Removed Values Added
References () https://github.com/dromara/hertzbeat/blob/6b599495763120ad1df6f4ed4b6713bb4885d8e2/home/blog/2023-09-26-hertzbeat-v1.4.1.md - Release Notes () https://github.com/dromara/hertzbeat/blob/6b599495763120ad1df6f4ed4b6713bb4885d8e2/home/blog/2023-09-26-hertzbeat-v1.4.1.md - Release Notes
References () https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2 - Patch () https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2 - Patch
References () https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj - Exploit, Vendor Advisory () https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 7.2

28 Aug 2024, 15:44

Type Values Removed Values Added
First Time Apache
Apache hertzbeat
CPE cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:* cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*

03 Jan 2024, 17:43

Type Values Removed Values Added
First Time Dromara
Dromara hertzbeat
CPE cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References () https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2 - () https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2 - Patch
References () https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj - () https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj - Exploit, Vendor Advisory
References () https://github.com/dromara/hertzbeat/blob/6b599495763120ad1df6f4ed4b6713bb4885d8e2/home/blog/2023-09-26-hertzbeat-v1.4.1.md - () https://github.com/dromara/hertzbeat/blob/6b599495763120ad1df6f4ed4b6713bb4885d8e2/home/blog/2023-09-26-hertzbeat-v1.4.1.md - Release Notes

22 Dec 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-22 21:15

Updated : 2024-11-21 08:38


NVD link : CVE-2023-51387

Mitre link : CVE-2023-51387

CVE.ORG link : CVE-2023-51387


JSON object : View

Products Affected

apache

  • hertzbeat
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')