Description
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
Remediation
References
https://access.redhat.com/errata/RHSA-2019:2413
https://github.com/hazelcast/hazelcast/issues/8024
https://github.com/hazelcast/hazelcast/pull/12230
Related Vulnerabilities
CVE-2019-10184 Vulnerability in maven package io.undertow:undertow-servlet
CVE-2020-10758 Vulnerability in maven package org.keycloak:keycloak-wildfly-server-subsystem
CVE-2020-35451 Vulnerability in maven package org.apache.oozie:oozie-tools
CVE-2020-28052 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk14
CVE-2019-10360 Vulnerability in maven package org.jenkins-ci.plugins.m2release:m2release