Vulnerability Description
Hertzbeat is an open source, real-time monitoring system. Hertzbeat has an authenticated (user role) RCE via unsafe deserialization in /api/monitors/import. This vulnerability is fixed in 1.6.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Hertzbeat | < 1.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/apache/hertzbeat/commit/79f5408e345e8e89da97be05f43e3204a950dPatch
- https://github.com/apache/hertzbeat/commit/9dbbfb7812fc4440ba72bdee66799edd519d0Patch
- https://github.com/apache/hertzbeat/pull/1611Patch
- https://github.com/apache/hertzbeat/pull/1620Patch
- https://github.com/apache/hertzbeat/pull/1620/files#diff-9c5fb3d1b7e3b0f54bc5c41Patch
- https://securitylab.github.com/advisories/GHSL-2023-254_GHSL-2023-256_HertzBeat/ExploitThird Party Advisory
FAQ
What is CVE-2024-42362?
CVE-2024-42362 is a vulnerability with a CVSS score of 8.8 (HIGH). Hertzbeat is an open source, real-time monitoring system. Hertzbeat has an authenticated (user role) RCE via unsafe deserialization in /api/monitors/import. This vulnerability is fixed in 1.6.0.
How severe is CVE-2024-42362?
CVE-2024-42362 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-42362?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Hertzbeat.