Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jv65-pf7v-f7p8

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Deserialization of Untrusted Data in Hazelcast

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

Пакеты

Наименование

com.hazelcast:hazelcast

maven
Затронутые версииВерсия исправления

< 3.11

3.11

EPSS

Процентиль: 85%
0.02445
Низкий

8.1 High

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 8.1
redhat
почти 10 лет назад

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

CVSS3: 8.1
nvd
больше 6 лет назад

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

CVSS3: 8.1
debian
больше 6 лет назад

In Hazelcast before 3.11, the cluster join procedure is vulnerable to ...

EPSS

Процентиль: 85%
0.02445
Низкий

8.1 High

CVSS3

Дефекты

CWE-502