Path to vulnerable library: /home/wss-scanner/.m2/repository/com/hazelcast/hazelcast/3.12.6/hazelcast-3.12.6.jar,/home/wss-scanner/.m2/repository/com/hazelcast/hazelcast/3.12.6/hazelcast-3.12.6.jar
In Hazelcast Platform through 5.3.4, a security issue exists within the SQL mapping for the CSV File Source connector. This issue arises from inadequate permission checking, which could enable unauthorized clients to access data from files stored on a member's filesystem.
CVE-2023-45860 - Medium Severity Vulnerability
Core Hazelcast Module
Library home page: http://www.hazelcast.com/
Path to dependency file: /jetty-hazelcast/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/com/hazelcast/hazelcast/3.12.6/hazelcast-3.12.6.jar,/home/wss-scanner/.m2/repository/com/hazelcast/hazelcast/3.12.6/hazelcast-3.12.6.jar
Dependency Hierarchy: - :x: **hazelcast-3.12.6.jar** (Vulnerable Library)
Found in HEAD commit: e4f77a76743d4b8fa6fe69cb1085577284ceb3e1
Found in base branch: master
In Hazelcast Platform through 5.3.4, a security issue exists within the SQL mapping for the CSV File Source connector. This issue arises from inadequate permission checking, which could enable unauthorized clients to access data from files stored on a member's filesystem.
Publish Date: 2024-02-16
URL: CVE-2023-45860
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: https://github.com/hazelcast/hazelcast/security/advisories/GHSA-8h4x-xvjp-vf99
Release Date: 2024-02-16
Fix Resolution: 5.2.5
Step up your Open Source Security Game with Mend here