3 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 3

In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, configuration routines don't mask passwords in the member configuration properly. This allows Hazelcast Management Center users to view some of the secrets. • https://github.com/miguelc49/CVE-2023-33264-2 https://github.com/miguelc49/CVE-2023-33264-3 https://github.com/miguelc49/CVE-2023-33264-1 https://github.com/hazelcast/hazelcast/pull/24266 • CWE-522: Insufficiently Protected Credentials •

CVSS: 9.1EPSS: 0%CPEs: 12EXPL: 0

The Connection handler in Hazelcast and Hazelcast Jet allows a remote unauthenticated attacker to access and manipulate data in the cluster with the identity of another already authenticated connection. The affected Hazelcast versions are through 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2. The affected Hazelcast Jet versions are through 4.5.3. El controlador de conexión en Hazelcast y Hazelcast Jet permite que un atacante remoto no autenticado acceda y manipule datos en el clúster con la identidad de otra conexión ya autenticada. Las versiones de Hazelcast afectadas son la 4.0.6, 4.1.9, 4.2.5, 5.0.3 y 5.1.2. • https://github.com/hazelcast/hazelcast/security/advisories/GHSA-c5hg-mr8r-f6jp https://access.redhat.com/security/cve/CVE-2022-36437 https://bugzilla.redhat.com/show_bug.cgi?id=2162053 • CWE-384: Session Fixation •

CVSS: 8.1EPSS: 2%CPEs: 1EXPL: 0

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code. En Hazelcast anterior de la versión 3.11, el procedimiento de apilado o agrupamiento es vulnerable a la ejecución remota de código por medio de la deserialización de Java. Si un atacante puede alcanzar una instancia de acceso a Hazelcast con un JoinRequest creado y existen clases vulnerables en el classpath, el atacante puede ejecutar un código arbitrario. A flaw was found in the cluster join procedure in Hazelcast. • https://access.redhat.com/errata/RHSA-2019:2413 https://github.com/hazelcast/hazelcast/issues/8024 https://github.com/hazelcast/hazelcast/pull/12230 https://access.redhat.com/security/cve/CVE-2016-10750 https://bugzilla.redhat.com/show_bug.cgi?id=1713215 • CWE-502: Deserialization of Untrusted Data •