Vulnerabilities
Vulnerable Software
Apache:  >> James  >> 3.7.0  Security Vulnerabilities
Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.
CVSS Score
7.8
EPSS Score
0.012
Published
2023-04-03
Usage of temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit. Vulnerable components includes the SMTP stack and IMAP APPEND command. This issue affects Apache James server version 3.7.2 and prior versions.
CVSS Score
5.5
EPSS Score
0.0
Published
2023-01-06
Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.
CVSS Score
7.5
EPSS Score
0.009
Published
2022-09-08


Contact Us

Shodan ® - All rights reserved