In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/hazelcast/hazelcast/issues/8024 | issue tracking third party advisory |
https://github.com/hazelcast/hazelcast/pull/12230 | issue tracking third party advisory |
https://access.redhat.com/errata/RHSA-2019:2413 | vendor advisory |