CVE-2023-51387

Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in version 1.4.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*

History

03 Jan 2024, 17:43

Type Values Removed Values Added
First Time Dromara hertzbeat
Dromara
CPE cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 7.2
v2 : unknown
v3 : 8.8
Summary
  • (es) Hertzbeat es un sistema de monitoreo en tiempo real de código abierto. Hertzbeat utiliza aviatorscript para evaluar expresiones de alerta. Se supone que las expresiones de alerta son expresiones simples. Sin embargo, debido a una sanitización inadecuada de las expresiones de alerta en versiones anteriores a la 1.4.1, un usuario malintencionado puede utilizar una expresión de alerta manipulada para ejecutar cualquier comando en el servidor hertzbeat. Un usuario malintencionado que tenga acceso a la función de definición de alertas puede ejecutar cualquier comando en la instancia de Hertzbeat. Este problema se solucionó en la versión 1.4.1.
References () https://github.com/dromara/hertzbeat/blob/6b599495763120ad1df6f4ed4b6713bb4885d8e2/home/blog/2023-09-26-hertzbeat-v1.4.1.md - () https://github.com/dromara/hertzbeat/blob/6b599495763120ad1df6f4ed4b6713bb4885d8e2/home/blog/2023-09-26-hertzbeat-v1.4.1.md - Release Notes
References () https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2 - () https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2 - Patch
References () https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj - () https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj - Exploit, Vendor Advisory

22 Dec 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-22 21:15

Updated : 2024-01-03 17:43


NVD link : CVE-2023-51387

Mitre link : CVE-2023-51387

CVE.ORG link : CVE-2023-51387


JSON object : View

Products Affected

dromara

  • hertzbeat
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')