← Zuruck zu CVEs
CVE-2023-51389
CRITICAL9.8
Beschreibung
Hertzbeat is a real-time monitoring system. At the interface of `/define/yml`, SnakeYAML is used as a parser to parse yml content, but no security configuration is used, resulting in a YAML deserialization vulnerability. Version 1.4.1 fixes this vulnerability.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht2/22/2024
Zuletzt geandert1/16/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apache:hertzbeat
Schwachen (CWE)
CWE-502CWE-502
Referenzen
https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17(security-advisories@github.com)
https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96(security-advisories@github.com)
https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.