GHSL-2023-255: HertzBeat Authenticated (user role) RCE via unsafe deserialization in /api/monitors/import
CVE-2024-42362

8.8HIGH

Key Information:

Vendor
Apache
Status
Vendor
CVE Published:
20 August 2024

Summary

The Hertzbeat monitoring system, an open-source real-time monitoring tool, contains a vulnerability that allows for remote code execution due to unsafe deserialization in its API endpoint '/api/monitors/import'. This flaw specifically affects authenticated user roles, potentially allowing attackers to execute arbitrary code on the server hosting Hertzbeat. The vulnerability has been addressed and mitigated in version 1.6.0, and users are encouraged to upgrade their installations accordingly. Further references for details on the vulnerability and its resolution can be found in the provided links.

Affected Version(s)

HertzBeat < 1.6.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.