In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Hazelcast | Hazelcast | * | 3.11 (excluding) | 
| Red Hat Fuse 7.4.0 | RedHat | hazelcast | * |