Description
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
Remediation
References
https://access.redhat.com/errata/RHSA-2019:2413
https://github.com/hazelcast/hazelcast/issues/8024
https://github.com/hazelcast/hazelcast/pull/12230
Related Vulnerabilities
CVE-2022-25875 Vulnerability in npm package svelte
CVE-2022-2218 Vulnerability in maven package org.webjars.npm:parse-url
CVE-2022-27340 Vulnerability in maven package net.mingsoft:ms-mcms
CVE-2023-27848 Vulnerability in npm package broccoli-compass
CVE-2016-4432 Vulnerability in maven package org.apache.qpid:qpid-broker-plugins-amqp-0-8-protocol