CVE-2022-39337
Permission bypass due to incorrect configuration in github.com/dromara/hertzbeat
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Hertzbeat is an open source, real-time monitoring system with custom-monitoring, high performance cluster, prometheus-like and agentless. Hertzbeat versions 1.20 and prior have a permission bypass vulnerability. System authentication can be bypassed and invoke interfaces without authorization. Version 1.2.1 contains a patch for this issue.
Hertzbeat es un sistema de monitoreo en tiempo real de código abierto con monitoreo personalizado, clúster de alto rendimiento, similar a Prometheus y sin agentes. Las versiones 1.20 y anteriores de Hertzbeat tienen una vulnerabilidad de omisión de permisos. La autenticación del sistema se puede omitir e invocar interfaces sin autorización. La versión 1.2.1 contiene un parche para este problema.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-09-02 CVE Reserved
- 2023-12-22 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-08-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-284: Improper Access Control
- CWE-863: Incorrect Authorization
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/dromara/hertzbeat/issues/377 | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://github.com/dromara/hertzbeat/commit/ac5970c6ceb64fafe237fc895243df5f21e40876 | 2024-01-02 | |
https://github.com/dromara/hertzbeat/pull/382 | 2024-01-02 |
URL | Date | SRC |
---|---|---|
https://github.com/dromara/hertzbeat/security/advisories/GHSA-434f-f5cw-3rj6 | 2024-01-02 |