CVE-2023-51387
CVSS V2 None
CVSS V3 None
Description
Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in version 1.4.1.
Overview
- CVE ID
- CVE-2023-51387
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-12-22T20:46:29.236Z
- Last Modified Date
- 2023-12-22T20:46:29.236Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj | x_refsource_CONFIRM |
https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2 | x_refsource_MISC |
https://github.com/dromara/hertzbeat/blob/6b599495763120ad1df6f4ed4b6713bb4885d8e2/home/blog/2023-09-26-hertzbeat-v1.4.1.md | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-51387 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51387 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-24 18:59:34 | Added to TrackCVE |