CVE-2023-51387

CWE-94Code Injection2 documents2 sources
Severity
8.8HIGH
EPSS
0.7%
top 29.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 22

Description

Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in versio

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages2 packages

NVDapache/hertzbeat< 1.4.1
CVEListV5dromara/hertzbeat< 1.4.1

Patches

🔴Vulnerability Details

1
CVEList
Expression Injection Vulnerability in Hertzbeat2023-12-22
CVE-2023-51387 (HIGH CVSS 8.8) | Hertzbeat is an open source | cvebase.io