René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

150 lines
5.3 KiB
JSON

{
"id": "CVE-2022-36437",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-29T23:15:09.883",
"lastModified": "2023-01-09T18:33:45.887",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Connection handler in Hazelcast and Hazelcast Jet allows a remote unauthenticated attacker to access and manipulate data in the cluster with the identity of another already authenticated connection. The affected Hazelcast versions are through 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2. The affected Hazelcast Jet versions are through 4.5.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:-:*:*:*",
"versionEndExcluding": "3.12.13",
"matchCriteriaId": "9AD93A64-104B-4896-A576-F0BF8A9D8874"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:enterprise:*:*:*",
"versionEndExcluding": "3.12.13",
"matchCriteriaId": "3EB5EBCF-D752-4E18-B046-D35E4A72F567"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:-:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.1.10",
"matchCriteriaId": "9CEE9CCA-A7A7-4607-A219-868977A66BE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.1.10",
"matchCriteriaId": "8274087A-7C77-4FF6-9D8A-1EC35EEBA79F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:-:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndExcluding": "4.2.6",
"matchCriteriaId": "A0425943-B0F0-445E-9DE6-B178C923AD4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "4.2.0",
"versionEndExcluding": "4.2.6",
"matchCriteriaId": "80E43CED-EA47-42F7-A974-DF486138B0B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:-:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.4",
"matchCriteriaId": "B7D1B9D0-C466-41C4-8D69-09B4CB0A015A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.4",
"matchCriteriaId": "6F49B2E6-5A58-4718-AB8F-C0C5A4E511C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:-:*:*:*",
"versionStartIncluding": "5.1.0",
"versionEndExcluding": "5.1.3",
"matchCriteriaId": "6525EDE4-68AE-403C-A3F4-C818E760A1A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:enterprise:*:*:*",
"versionStartIncluding": "5.1.0",
"versionEndExcluding": "5.1.3",
"matchCriteriaId": "CF83CEDB-CF27-426C-B846-DB1596627D33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast-jet:*:*:*:*:-:*:*:*",
"versionEndExcluding": "4.5.4",
"matchCriteriaId": "5ADD9F81-E40B-4BB8-9422-6ED2006043D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hazelcast:hazelcast-jet:*:*:*:*:enterprise:*:*:*",
"versionEndExcluding": "4.5.4",
"matchCriteriaId": "FF545793-D052-4EFA-B74B-C6FC3DF12989"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hazelcast/hazelcast/security/advisories/GHSA-c5hg-mr8r-f6jp",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}