Description
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.
Remediation
References
https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing
Related Vulnerabilities
CVE-2020-8908 Vulnerability in maven package com.google.guava:guava
CVE-2021-32854 Vulnerability in maven package org.webjars.bower:textangular
CVE-2023-37602 Vulnerability in maven package org.opencms:opencms-core
CVE-2020-7751 Vulnerability in npm package pathval
CVE-2023-40573 Vulnerability in maven package org.xwiki.platform:xwiki-platform-scheduler-api