CVE-2023-51387
- Reference to the description:
- Description:
- Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in version 1.4.1.
- Last updated date:
- 08/28/2024
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/03/2024
- Reference url to background
https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj