Hertzbeat is a real-time monitoring system. In the implementation of `JmxCollectImpl.java`, `JMXConnectorFactory.connect` is vulnerable to JNDI injection. The corresponding interface is `/api/monitor/detect`. If there is a URL field, the address will be used by default. When the URL is `service:jmx:rmi:///jndi/rmi://xxxxxxx:1099/localHikari`, it can be exploited to cause remote code execution. Version 1.4.1 contains a fix for this issue.
History

Tue, 22 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Dromara
Dromara hertzbeat
CPEs cpe:2.3:a:dromara:hertzbeat:1.4.1:*:*:*:*:*:*:*
Vendors & Products Dromara
Dromara hertzbeat
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 16 Jan 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache hertzbeat
CPEs cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache hertzbeat

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-02-22T15:39:49.280Z

Updated: 2025-04-22T16:19:23.604Z

Reserved: 2023-12-20T22:12:04.737Z

Link: CVE-2023-51653

cve-icon Vulnrichment

Updated: 2024-08-02T22:40:34.196Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-22T16:15:53.800

Modified: 2025-01-16T19:04:56.533

Link: CVE-2023-51653

cve-icon Redhat

No data.