CVE-2023-45859 – com.hazelcast:hazelcast
Package
Manager: maven
Name: com.hazelcast:hazelcast
Vulnerable Version: >=0 <=4.1.10 || >=4.2 <=4.2.8 || >=5.0 <=5.0.5 || >=5.1 <=5.1.7 || >=5.2.0 <5.2.5 || >=5.3.0 <5.3.5
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00201 pctl0.42363
Details
Missing permission checks on Hazelcast client protocol ### Impact In Hazelcast through 4.1.10, 4.2 through 4.2.8, 5.0 through 5.0.5, 5.1 through 5.1.7, 5.2 through 5.2.4, and 5.3 through 5.3.2, some client operations don't check permissions properly, allowing authenticated users to access data stored in the cluster. ### Patches Fix versions: 5.2.5, 5.3.5, 5.4.0-BETA-1 ### Workarounds There is no known workaround.
Metadata
Created: 2024-02-27T21:54:15Z
Modified: 2025-05-30T12:36:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-xh6m-7cr7-xx66/GHSA-xh6m-7cr7-xx66.json
CWE IDs: ["CWE-281", "CWE-922"]
Alternative ID: GHSA-xh6m-7cr7-xx66
Finding: F159
Auto approve: 1