Hertzbeat is a real-time monitoring system. In the implementation of `JmxCollectImpl.java`, `JMXConnectorFactory.connect` is vulnerable to JNDI injection. The corresponding interface is `/api/monitor/detect`. If there is a URL field, the address will be used by default. When the URL is `service:jmx:rmi:///jndi/rmi://xxxxxxx:1099/localHikari`, it can be exploited to cause remote code execution. Version 1.4.1 contains a fix for this issue.
History

Thu, 16 Jan 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache hertzbeat
CPEs cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache hertzbeat

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T22:40:34.196Z

Reserved: 2023-12-20T22:12:04.737Z

Link: CVE-2023-51653

cve-icon Vulnrichment

Updated: 2024-08-02T22:40:34.196Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-22T16:15:53.800

Modified: 2025-01-16T19:04:56.533

Link: CVE-2023-51653

cve-icon Redhat

No data.