In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-05-22T13:40:06
Updated: 2024-08-06T03:30:20.142Z
Reserved: 2019-05-22T00:00:00
Link: CVE-2016-10750
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-05-22T14:29:00.223
Modified: 2024-11-21T02:44:39.580
Link: CVE-2016-10750
Redhat