First published: Tue Jul 18 2023(Updated: )
### Impact In Hazelcast Platform, 5.0 through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, and Hazelcast IMDG (all versions up to 4.2.z), Executor Services don't check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted. ### Patches Fix versions: 5.3.0, 5.2.4, 5.1.7, 5.0.5 ### Workarounds Users are only affected when they already use executor services (i.e., an instance exists as a distributed data structure).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.hazelcast:hazelcast-enterprise | <=5.0.4 | 5.0.5 |
maven/com.hazelcast:hazelcast-enterprise | >=5.1.0<=5.1.6 | 5.1.7 |
maven/com.hazelcast:hazelcast-enterprise | >=5.2.0<=5.2.3 | 5.2.4 |
maven/com.hazelcast:hazelcast | <=5.0.4 | 5.0.5 |
maven/com.hazelcast:hazelcast | >=5.1.0<=5.1.6 | 5.1.7 |
maven/com.hazelcast:hazelcast | >=5.2.0<=5.2.3 | 5.2.4 |
Hazelcast | >=5.0.0<5.0.5 | |
Hazelcast | >=5.0.0<5.0.5 | |
Hazelcast | >=5.1.0<5.1.7 | |
Hazelcast | >=5.1.0<5.1.7 | |
Hazelcast | >=5.2.0<5.2.4 | |
Hazelcast | >=5.2.0<5.2.4 | |
Hazelcast | <=4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33265 has a severity of 8.8 (high).
CVE-2023-33265 allows authenticated users to execute tasks on members without the required permissions granted in Hazelcast Platform versions 5.0 through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3.
Yes, the remedy for CVE-2023-33265 is to upgrade to version 5.0.5 if using Hazelcast Enterprise, or to upgrade to version 5.0.5 if using Hazelcast IMDG.
More information about CVE-2023-33265 can be found in the security advisory on the Hazelcast support website and on the GitHub repository for Hazelcast.
CVE-2023-33265 is associated with CWE-862.