Description
JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors.
Remediation
References
Related Vulnerabilities
WordPress Plugin DirectoryPress-Business Directory And Classified Ad Listing SQL Injection (3.6.10)
WordPress Plugin WP Fastest Cache SQL Injection (0.8.4.8)
Django Improper Validation of Specified Quantity in Input Vulnerability (CVE-2023-41164)
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2009-0499)