Description
JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors.
Remediation
References
Related Vulnerabilities
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-4340)
WordPress Plugin Copify Cross-Site Request Forgery (1.3.0)
MongoDb Out-of-bounds Read Vulnerability (CVE-2017-14227)
OpenSSL Cryptographic Issues Vulnerability (CVE-2014-8275)
WordPress Plugin Elementor Website Builder Multiple Vulnerabilities (3.16.4)