Vulnerabilities > CVE-2023-51389 - Deserialization of Untrusted Data vulnerability in Apache Hertzbeat
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Hertzbeat is a real-time monitoring system. At the interface of `/define/yml`, SnakeYAML is used as a parser to parse yml content, but no security configuration is used, resulting in a YAML deserialization vulnerability. Version 1.4.1 fixes this vulnerability.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17
- https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17
- https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96
- https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96