Java Deserialization Vulnerability in Apache James by Apache
CVE-2017-12628
7.8HIGH
Summary
The Apache James server, which includes an embedded JMX server, is vulnerable to a Java deserialization issue. This flaw allows for the execution of arbitrary commands through the JMX interface. By default, the JMX socket is exposed only on the local host, which means this vulnerability can lead to privilege escalation under certain conditions. To mitigate this risk, users are advised to upgrade to version 3.0.1, which addresses the insecure library that contributes to this vulnerability.
Affected Version(s)
Apache James 3.0.0
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved