Логотип exploitDog
bind:CVE-2023-51518
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-51518

Количество 2

Количество 2

nvd логотип

CVE-2023-51518

почти 2 года назад

Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation. Note that by default JMX endpoint is only bound locally. We recommend users to:  - Upgrade to a non-vulnerable Apache James version  - Run Apache James isolated from other processes (docker - dedicated virtual machine)  - If possible turn off JMX

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-px7w-c9gw-7gj3

почти 2 года назад

Apache James server: Privilege escalation via JMX pre-authentication deserialization

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-51518

Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation. Note that by default JMX endpoint is only bound locally. We recommend users to:  - Upgrade to a non-vulnerable Apache James version  - Run Apache James isolated from other processes (docker - dedicated virtual machine)  - If possible turn off JMX

CVSS3: 9.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-px7w-c9gw-7gj3

Apache James server: Privilege escalation via JMX pre-authentication deserialization

CVSS3: 9.8
0%
Низкий
почти 2 года назад

Уязвимостей на страницу