Описание
The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades the incriminated library.
Ссылки
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 3.0.0 (включая)
cpe:2.3:a:apache:james_server:*:*:*:*:*:*:*:*
EPSS
Процентиль: 35%
0.00142
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-502
Связанные уязвимости
EPSS
Процентиль: 35%
0.00142
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-502