First published: Thu May 23 2019(Updated: )
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. Upstream issue: <a href="https://github.com/hazelcast/hazelcast/issues/8024">https://github.com/hazelcast/hazelcast/issues/8024</a> Upstream pull: <a href="https://github.com/hazelcast/hazelcast/pull/12230">https://github.com/hazelcast/hazelcast/pull/12230</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Hazelcast | <3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1713215 is categorized as a critical vulnerability due to its potential for remote code execution.
To remediate REDHAT-BUG-1713215, upgrade Hazelcast to version 3.11 or later.
The impact of REDHAT-BUG-1713215 includes the potential for remote attackers to execute arbitrary code on affected systems.
Hazelcast versions prior to 3.11 are affected by REDHAT-BUG-1713215.
No official workaround exists for REDHAT-BUG-1713215; upgrading is the recommended approach.