Description
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
Remediation
References
https://access.redhat.com/errata/RHSA-2019:2413
https://github.com/hazelcast/hazelcast/issues/8024
https://github.com/hazelcast/hazelcast/pull/12230
Related Vulnerabilities
CVE-2021-43090 Vulnerability in maven package com.predic8:soa-model-core
CVE-2018-19056 Vulnerability in maven package org.webjars.bowergithub.pandao:editor.md
CVE-2022-42466 Vulnerability in maven package org.apache.isis.core:isis-applib
CVE-2021-32702 Vulnerability in npm package nextjs-auth0
CVE-2020-2295 Vulnerability in maven package org.jkva.maven-plugins:cascading-release-maven-plugin