Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI.
References
Link | Resource |
---|---|
https://docs.hazelcast.com/management-center/6.0-snapshot/getting-started/install | Product |
https://gist.github.com/azraelxuemo/c3d42739aa3306a41111ef603dc65b4c | Third Party Advisory |
Configurations
History
07 Jul 2025, 18:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.hazelcast.com/management-center/6.0-snapshot/getting-started/install - Product | |
References | () https://gist.github.com/azraelxuemo/c3d42739aa3306a41111ef603dc65b4c - Third Party Advisory | |
First Time |
Hazelcast management Center
Hazelcast |
|
CPE | cpe:2.3:a:hazelcast:management_center:*:*:*:*:-:*:*:* |
22 Apr 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-94 | |
Summary |
|
17 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-17 16:15
Updated : 2025-07-07 18:18
NVD link : CVE-2024-56518
Mitre link : CVE-2024-56518
CVE.ORG link : CVE-2024-56518
JSON object : View
Products Affected
hazelcast
- management_center
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')