logo

CVE-2023-45859 com.hazelcast:hazelcast

Package

Manager: maven
Name: com.hazelcast:hazelcast
Vulnerable Version: >=0 <=4.1.10 || >=4.2 <=4.2.8 || >=5.0 <=5.0.5 || >=5.1 <=5.1.7 || >=5.2.0 <5.2.5 || >=5.3.0 <5.3.5

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00201 pctl0.42363

Details

Missing permission checks on Hazelcast client protocol ### Impact In Hazelcast through 4.1.10, 4.2 through 4.2.8, 5.0 through 5.0.5, 5.1 through 5.1.7, 5.2 through 5.2.4, and 5.3 through 5.3.2, some client operations don't check permissions properly, allowing authenticated users to access data stored in the cluster. ### Patches Fix versions: 5.2.5, 5.3.5, 5.4.0-BETA-1 ### Workarounds There is no known workaround.

Metadata

Created: 2024-02-27T21:54:15Z
Modified: 2025-05-30T12:36:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-xh6m-7cr7-xx66/GHSA-xh6m-7cr7-xx66.json
CWE IDs: ["CWE-281", "CWE-922"]
Alternative ID: GHSA-xh6m-7cr7-xx66
Finding: F159
Auto approve: 1