First published: Tue Jul 18 2023(Updated: )
In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, executor services don't check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.hazelcast:hazelcast-enterprise | <=5.0.4 | 5.0.5 |
maven/com.hazelcast:hazelcast-enterprise | >=5.1.0<=5.1.6 | 5.1.7 |
maven/com.hazelcast:hazelcast-enterprise | >=5.2.0<=5.2.3 | 5.2.4 |
maven/com.hazelcast:hazelcast | <=5.0.4 | 5.0.5 |
maven/com.hazelcast:hazelcast | >=5.1.0<=5.1.6 | 5.1.7 |
maven/com.hazelcast:hazelcast | >=5.2.0<=5.2.3 | 5.2.4 |
Hazelcast Hazelcast | >=5.0.0<5.0.5 | |
Hazelcast Hazelcast | >=5.0.0<5.0.5 | |
Hazelcast Hazelcast | >=5.1.0<5.1.7 | |
Hazelcast Hazelcast | >=5.1.0<5.1.7 | |
Hazelcast Hazelcast | >=5.2.0<5.2.4 | |
Hazelcast Hazelcast | >=5.2.0<5.2.4 | |
Hazelcast IMDG | <=4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33265 has a severity of 8.8 (high).
CVE-2023-33265 allows authenticated users to execute tasks on members without the required permissions granted in Hazelcast Platform versions 5.0 through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3.
Yes, the remedy for CVE-2023-33265 is to upgrade to version 5.0.5 if using Hazelcast Enterprise, or to upgrade to version 5.0.5 if using Hazelcast IMDG.
More information about CVE-2023-33265 can be found in the security advisory on the Hazelcast support website and on the GitHub repository for Hazelcast.
CVE-2023-33265 is associated with CWE-862.