First published: Thu Apr 17 2025(Updated: )
Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hazelcast Management Center | <6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-56518 is critical due to its potential for remote code execution.
To fix CVE-2024-56518, upgrade to Hazelcast Management Center version 6.1 or later.
CVE-2024-56518 affects Hazelcast Management Center versions up to and including 6.0.
The impact of CVE-2024-56518 is that it allows remote attackers to execute arbitrary code on the server.
Yes, CVE-2024-56518 allows manipulation of the user.provider.url parameter through user-uploaded XML configuration files.