First published: Fri Dec 22 2023(Updated: )
Hertzbeat is an open source, real-time monitoring system. Prior to version 1.4.1, Spring Boot permission configuration issues caused unauthorized access vulnerabilities to three interfaces. This could result in disclosure of sensitive server information. Version 1.4.1 fixes this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dromara Hertzbeat | <1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51650 is classified as a medium severity vulnerability due to unauthorized access risks.
To fix CVE-2023-51650, upgrade to Hertzbeat version 1.4.1 or later.
CVE-2023-51650 impacts Hertzbeat prior to version 1.4.1, specifically affecting the permission configuration.
CVE-2023-51650 could lead to the disclosure of sensitive server information.
There are no known workarounds for CVE-2023-51650, the recommendation is to upgrade to the latest version.