cve/2023/CVE-2023-51388.md

19 lines
970 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-51388](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51388)
![](https://img.shields.io/static/v1?label=Product&message=hertzbeat&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.4.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brighgreen)
### Description
Hertzbeat is a real-time monitoring system. In `CalculateAlarm.java`, `AviatorEvaluator` is used to directly execute the expression function, and no security policy is configured, resulting in AviatorScript (which can execute any static method by default) script injection. Version 1.4.1 fixes this vulnerability.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/luelueking/luelueking