Description
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
Remediation
References
https://access.redhat.com/errata/RHSA-2019:2413
https://github.com/hazelcast/hazelcast/issues/8024
https://github.com/hazelcast/hazelcast/pull/12230
Related Vulnerabilities
CVE-2023-40826 Vulnerability in maven package org.pf4j:pf4j
CVE-2020-25711 Vulnerability in maven package org.infinispan:infinispan-server-rest
CVE-2021-32850 Vulnerability in npm package @claviska/jquery-minicolors
CVE-2017-16024 Vulnerability in npm package sync-exec
CVE-2021-22096 Vulnerability in maven package org.springframework:spring-core