Description
JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors.
Remediation
References
Related Vulnerabilities
XOOPS Other Vulnerability (CVE-2006-5810)
WordPress Other Vulnerability (CVE-2007-4154)
Oracle Database Server CVE-2023-22073 Vulnerability (CVE-2023-22073)
Ruby on Rails Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3514)
WordPress Plugin Gallery-Video Gallery and Youtube Gallery Multiple Vulnerabilities (2.0.3)