First published: Tue Aug 20 2024(Updated: )
Hertzbeat is an open source, real-time monitoring system. Hertzbeat 1.6.0 and earlier declares a /api/monitor/{monitorId}/metric/{metricFull} endpoint to download job metrics. In the process, it executes a SQL query with user-controlled data, allowing for SQL injection.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dromara Hertzbeat | <1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42361 is considered a critical vulnerability due to the potential for SQL injection attacks.
To fix CVE-2024-42361, upgrade Hertzbeat to version 1.6.1 or later where the SQL injection vulnerability is addressed.
CVE-2024-42361 allows attackers to execute arbitrary SQL commands, potentially leading to unauthorized data access or modification.
CVE-2024-42361 affects Hertzbeat versions 1.6.0 and earlier.
Yes, CVE-2024-42361 can be exploited remotely through the vulnerable API endpoint.