In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4434 In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
Github GHSA Github GHSA GHSA-jv65-pf7v-f7p8 Deserialization of Untrusted Data in Hazelcast
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:30:20.142Z

Reserved: 2019-05-22T00:00:00

Link: CVE-2016-10750

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-22T14:29:00.223

Modified: 2024-11-21T02:44:39.580

Link: CVE-2016-10750

cve-icon Redhat

Severity : Important

Publid Date: 2016-04-26T00:00:00Z

Links: CVE-2016-10750 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses