CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
38.4%
In Hazelcast Platform, 5.0 through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, and Hazelcast IMDG (all versions up to 4.2.z), Executor Services don’t check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted.
Fix versions: 5.3.0, 5.2.4, 5.1.7, 5.0.5
Users are only affected when they already use executor services (i.e., an instance exists as a distributed data structure).
Vendor | Product | Version | CPE |
---|---|---|---|
com.hazelcast | hazelcast-enterprise | * | cpe:2.3:a:com.hazelcast:hazelcast-enterprise:*:*:*:*:*:*:*:* |
com.hazelcast | hazelcast | * | cpe:2.3:a:com.hazelcast:hazelcast:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-c5vj-wp4v-mmvx
github.com/hazelcast/hazelcast
github.com/hazelcast/hazelcast/releases/tag/v5.0.5
github.com/hazelcast/hazelcast/releases/tag/v5.1.7
github.com/hazelcast/hazelcast/releases/tag/v5.2.4
github.com/hazelcast/hazelcast/security/advisories/GHSA-c5vj-wp4v-mmvx
nvd.nist.gov/vuln/detail/CVE-2023-33265
support.hazelcast.com/s/article/Security-Advisory-for-CVE-2023-33265