[MAVEN:GHSA-JV65-PF7V-F7P8] Deserialization of Untrusted Data in Hazelcast

Severity High
Affected Packages 1
Fixed Packages 1
CVEs 1

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

Package Affected Version
pkg:maven/com.hazelcast/hazelcast < 3.11
Package Fixed Version
pkg:maven/com.hazelcast/hazelcast = 3.11
ID
MAVEN:GHSA-JV65-PF7V-F7P8
Severity
high
URL
https://github.com/advisories/GHSA-jv65-pf7v-f7p8
Published
2022-05-24T16:46:09
(2 years ago)
Modified
2023-01-27T05:02:49
(20 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/com.hazelcast/hazelcast com.hazelcast hazelcast < 3.11
Fixed pkg:maven/com.hazelcast/hazelcast com.hazelcast hazelcast = 3.11
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...