Hertzbeat is a real-time monitoring system. In the implementation of `JmxCollectImpl.java`, `JMXConnectorFactory.connect` is vulnerable to JNDI injection. The corresponding interface is `/api/monitor/detect`. If there is a URL field, the address will be used by default. When the URL is `service:jmx:rmi:///jndi/rmi://xxxxxxx:1099/localHikari`, it can be exploited to cause remote code execution. Version 1.4.1 contains a fix for this issue.
Metrics
Affected Vendors & Products
References
History
Thu, 16 Jan 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache hertzbeat |
|
CPEs | cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache hertzbeat |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T22:40:34.196Z
Reserved: 2023-12-20T22:12:04.737Z
Link: CVE-2023-51653

Updated: 2024-08-02T22:40:34.196Z

Status : Analyzed
Published: 2024-02-22T16:15:53.800
Modified: 2025-01-16T19:04:56.533
Link: CVE-2023-51653

No data.