GHSL-2023-255: HertzBeat Authenticated (user role) RCE via unsafe deserialization in /api/monitors/import
CVE-2024-42362
8.8HIGH
Summary
The Hertzbeat monitoring system, an open-source real-time monitoring tool, contains a vulnerability that allows for remote code execution due to unsafe deserialization in its API endpoint '/api/monitors/import'. This flaw specifically affects authenticated user roles, potentially allowing attackers to execute arbitrary code on the server hosting Hertzbeat. The vulnerability has been addressed and mitigated in version 1.6.0, and users are encouraged to upgrade their installations accordingly. Further references for details on the vulnerability and its resolution can be found in the provided links.
Affected Version(s)
HertzBeat < 1.6.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published