Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-56362 | Hertzbeat is a real-time monitoring system. In the implementation of `JmxCollectImpl.java`, `JMXConnectorFactory.connect` is vulnerable to JNDI injection. The corresponding interface is `/api/monitor/detect`. If there is a URL field, the address will be used by default. When the URL is `service:jmx:rmi:///jndi/rmi://xxxxxxx:1099/localHikari`, it can be exploited to cause remote code execution. Version 1.4.1 contains a fix for this issue. |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 22 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dromara
Dromara hertzbeat |
|
| CPEs | cpe:2.3:a:dromara:hertzbeat:1.4.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Dromara
Dromara hertzbeat |
|
| Metrics |
ssvc
|
Thu, 16 Jan 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache hertzbeat |
|
| CPEs | cpe:2.3:a:apache:hertzbeat:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache hertzbeat |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T16:19:23.604Z
Reserved: 2023-12-20T22:12:04.737Z
Link: CVE-2023-51653
Updated: 2024-08-02T22:40:34.196Z
Status : Analyzed
Published: 2024-02-22T16:15:53.800
Modified: 2025-01-16T19:04:56.533
Link: CVE-2023-51653
No data.
OpenCVE Enrichment
No data.
EUVD