Details
-
Bug
-
Status: Closed (View Workflow)
-
TBD
-
Resolution: Done
-
4.13.0, 4.13.1, 4.13.2, 4.14.0, 4.14.1, 4.14.2, 4.14.3, 4.14.4, 4.14.5, 4.14.6, 4.14.7
-
CP: Sprint 156
-
1
-
Core: Platform
-
Related dependency upgrade
-
Lotus (R1 2022)
Description
Hazelcast up to 4.2.5 allows a remote unauthenticated attacker to access and manipulate data in the cluster with the identity of another already authenticated connection:
https://nvd.nist.gov/vuln/detail/CVE-2022-36437
Okapi 4.14.0 - 4.14.7 and 4.13.0 - 4.13.2 and all older versions use a vulnerable Hazelcast version.
Okapi 4.14.8 and all following versions and 4.13.3 and all following 4.13.x versions use the fixed Hazelcast version.
This issue bumps Hazelcast from 4.2.2 to 4.2.6 in the b14.3 branch.
The b14.4 branch had been updated before the security issue was published: https://github.com/folio-org/okapi/releases/tag/v4.14.8
TestRail: Results
Attachments
Issue Links
- relates to
-
MODEUSHARV-78 Hazelcast 4.2.6 fixing improper authentication CVE-2022-36437, RMB 35.0.4, Vert.x 4.3.7
-
- Closed
-
-
OKAPI-1153 Release Okapi 4.13.3
-
- Closed
-
-
OKAPI-1137 Upgrade to Hazelcast 4.2.6
-
- Closed
-