CVE-2023-51389Deserialization of Untrusted Data in Hertzbeat

Severity
9.8CRITICALNVD
EPSS
0.5%
top 33.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 22

Description

Hertzbeat is a real-time monitoring system. At the interface of `/define/yml`, SnakeYAML is used as a parser to parse yml content, but no security configuration is used, resulting in a YAML deserialization vulnerability. Version 1.4.1 fixes this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDapache/hertzbeat< 1.4.1
CVEListV5dromara/hertzbeat< 1.4.1

Patches

🔴Vulnerability Details

1
CVEList
HertzBeat SnakeYAML Deser RCE2024-02-22
CVE-2023-51389 — Deserialization of Untrusted Data | cvebase