Hertzbeat is an open source, real-time monitoring system. Hertzbeat has an authenticated (user role) RCE via unsafe deserialization in /api/monitors/import. This vulnerability is fixed in 1.6.0.
References
Configurations
History
28 Aug 2024, 13:49
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache
Apache hertzbeat |
|
CPE | cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:* | |
References | () https://github.com/apache/hertzbeat/commit/79f5408e345e8e89da97be05f43e3204a950ddfb - Patch | |
References | () https://github.com/apache/hertzbeat/commit/9dbbfb7812fc4440ba72bdee66799edd519d06bb - Patch | |
References | () https://github.com/apache/hertzbeat/pull/1611 - Patch | |
References | () https://github.com/apache/hertzbeat/pull/1620 - Patch | |
References | () https://github.com/apache/hertzbeat/pull/1620/files#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8 - Patch | |
References | () https://securitylab.github.com/advisories/GHSL-2023-254_GHSL-2023-256_HertzBeat/ - Exploit, Third Party Advisory |
21 Aug 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-20 21:15
Updated : 2024-08-28 13:49
NVD link : CVE-2024-42362
Mitre link : CVE-2024-42362
CVE.ORG link : CVE-2024-42362
JSON object : View
Products Affected
apache
- hertzbeat
CWE
CWE-502
Deserialization of Untrusted Data