Apache James Privilege Escalation
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Oct 23, 2023
Description
Published by the National Vulnerability Database
Oct 20, 2017
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Jul 27, 2023
Last updated
Oct 23, 2023
The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades the incriminated library.
References