In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
{ "nvd_published_at": "2019-05-22T14:29:00Z", "github_reviewed_at": "2022-07-06T20:03:09Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-502" ] }