This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Hertzbeat < 1.4.1 suffers from **YAML Deserialization** via `/define/yml`. π **Consequences**: Full system compromise. CVSS 9.8 (Critical).β¦
π‘οΈ **Root Cause**: **CWE-502** (Deserialization of Untrusted Data). The `/define/yml` endpoint uses **SnakeYAML** without secure configuration. β οΈ It trusts input blindly, allowing malicious payloads to execute code.
Q3Who is affected? (Versions/Components)
π― **Affected**: **Hertzbeat** by **dromara**. π **Version**: All versions **before 1.4.1**. If you are running 1.4.0 or older, you are vulnerable.
Q4What can hackers do? (Privileges/Data)
π **Attacker Power**: **RCE (Remote Code Execution)**. π **Impact**: High Confidentiality, Integrity, and Availability loss. Hackers can run arbitrary commands, steal monitoring data, or crash the server.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: **LOW**. π« **Auth**: None required (`PR:N`). π **Network**: Remote (`AV:N`). π§ **Complexity**: Low (`AC:L`). No user interaction needed (`UI:N`). Easy to exploit!
Q6Is there a public Exp? (PoC/Wild Exploitation)
π¦ **Public Exp?**: No specific PoC code listed in data. π **Wild Exp**: Likely possible due to low complexity. β οΈ Assume it is exploitable in the wild until patched.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for **Hertzbeat** services. π‘ Check if version is **< 1.4.1**. πΈοΈ Test the `/define/yml` endpoint for YAML parsing behavior. Use CVE scanners to detect CWE-502 patterns.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed?**: **YES**. π οΈ **Patch**: Upgrade to **Hertzbeat 1.4.1** or later.β¦
π§ **No Patch?**: **Block** access to `/define/yml` via WAF/Network ACL. π« **Restrict**: Limit network access to the Hertzbeat UI. π **Disable**: If possible, disable the YAML definition feature temporarily.