CVE-2023-51653
CRITICAL
Published 2024-02-22T15:39:49.280Z
Actions:
CVSS Score
V3.1
9.8
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.002
probability
of exploitation in the wild
There is a 0.2% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.524
Higher than 52.4% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
Hertzbeat is a real-time monitoring system. In the implementation of `JmxCollectImpl.java`, `JMXConnectorFactory.connect` is vulnerable to JNDI injection. The corresponding interface is `/api/monitor/detect`. If there is a URL field, the address will be used by default. When the URL is `service:jmx:rmi:///jndi/rmi://xxxxxxx:1099/localHikari`, it can be exploited to cause remote code execution. Version 1.4.1 contains a fix for this issue.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
References
Published: 2024-02-22T15:39:49.280Z
Last Modified: 2025-04-22T16:19:23.604Z
Copied to clipboard!