We found results for “”
CVE-2023-51653
Date: February 22, 2024
Hertzbeat is a real-time monitoring system. In the implementation of "JmxCollectImpl.java", "JMXConnectorFactory.connect" is vulnerable to JNDI injection. The corresponding interface is "/api/monitor/detect". If there is a URL field, the address will be used by default. When the URL is "service:jmx:rmi:///jndi/rmi://xxxxxxx:1099/localHikari", it can be exploited to cause remote code execution. Version 1.4.1 contains a fix for this issue.
Language: Java
Severity Score
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE-74CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


