Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-51653
HistoryFeb 22, 2024 - 4:15 p.m.

Code injection

2024-02-2216:15:00
PRIOn knowledge base
www.prio-n.com
5
jndi injection
code execution
jmxconnectorfactory.connect
jmxcollectimpl.java
remote exploit
version 1.4.1

8.3 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%

Hertzbeat is a real-time monitoring system. In the implementation of JmxCollectImpl.java, JMXConnectorFactory.connect is vulnerable to JNDI injection. The corresponding interface is /api/monitor/detect. If there is a URL field, the address will be used by default. When the URL is service:jmx:rmi:///jndi/rmi://xxxxxxx:1099/localHikari, it can be exploited to cause remote code execution. Version 1.4.1 contains a fix for this issue.

8.3 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.2%

Related for PRION:CVE-2023-51653