Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-10750

Опубликовано: 26 апр. 2016
Источник: redhat
CVSS3: 8.1

Описание

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

A flaw was found in the cluster join procedure in Hazelcast. This flaw allows an attacker to gain remote code execution via Java deserialization.

Отчет

The module vertx-hazelcast is not supported in Red Hat OpenShift Application Runtimes (RHOAR) products.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Fuse 6hazelcastAffected
Red Hat OpenShift Application RuntimeshazelcastWill not fix
Red Hat Fuse 7.4.0hazelcastFixedRHSA-2019:241308.08.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1713215hazelcast: java deserialization in join cluster procedure leading to remote code execution

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 6 лет назад

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

CVSS3: 8.1
debian
больше 6 лет назад

In Hazelcast before 3.11, the cluster join procedure is vulnerable to ...

CVSS3: 8.1
github
больше 3 лет назад

Deserialization of Untrusted Data in Hazelcast

8.1 High

CVSS3