Description
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4434 | In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code. |
Github GHSA |
GHSA-jv65-pf7v-f7p8 | Deserialization of Untrusted Data in Hazelcast |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T03:30:20.142Z
Reserved: 2019-05-22T00:00:00.000Z
Link: CVE-2016-10750
No data.
Status : Modified
Published: 2019-05-22T14:29:00.223
Modified: 2024-11-21T02:44:39.580
Link: CVE-2016-10750
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA