[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2023-26269: Apache James server: Privilege escalation through unauthenticated JMX
From: Benoit Tellier <btellier () apache ! org>
Date: 2023-03-31 5:28:03
Message-ID: b25b13ef-81bb-4d59-930d-a566659f8b2f () apache ! org
[Download RAW message or body]
Severity: moderate
Description:
Apache James server version 3.7.3 and earlier provides a JMX management service without \
authentication by default. This allows privilege escalation by a malicious local user.
Administrators are advised to disable JMX, or set up a JMX password.
Work Arounds:
Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.
Credit:
Matei "Mal" Badanoiu (reporter)
References:
https://james.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-26269
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic