Vulnerability Details CVE-2024-56518
Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 51.3%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2024-56518
-
cpe:2.3:a:hazelcast:management_center:4.2022.01
-
cpe:2.3:a:hazelcast:management_center:5.0
-
cpe:2.3:a:hazelcast:management_center:5.1
-
cpe:2.3:a:hazelcast:management_center:5.2
-
cpe:2.3:a:hazelcast:management_center:5.3
-
cpe:2.3:a:hazelcast:management_center:5.4
-
cpe:2.3:a:hazelcast:management_center:5.5
-
cpe:2.3:a:hazelcast:management_center:5.6
-
cpe:2.3:a:hazelcast:management_center:5.7
-
cpe:2.3:a:hazelcast:management_center:5.8
-
cpe:2.3:a:hazelcast:management_center:6.0