Description
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
Remediation
References
https://github.com/hazelcast/hazelcast/pull/12230
https://github.com/hazelcast/hazelcast/issues/8024
https://access.redhat.com/errata/RHSA-2019:2413
Related Vulnerabilities
CVE-2018-20594 Vulnerability in maven package org.hswebframework.web:hsweb-system-workflow-local
CVE-2016-10563 Vulnerability in npm package go-ipfs-dep
CVE-2021-44521 Vulnerability in maven package org.apache.cassandra:cassandra-all
CVE-2022-37767 Vulnerability in maven package io.pebbletemplates:pebble