[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2023-51518: Apache James server: Privilege escalation via JMX pre-authentication
From: Benoit Tellier <btellier () apache ! org>
Date: 2024-02-26 17:10:05
Message-ID: 860984fc-1094-4724-3ab9-d948a43d304b () apache ! org
[Download RAW message or body]
Severity: low
Affected versions:
- Apache James server through 3.7.4
- Apache James server 3.8 through 3.8.0
Description:
Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to \
pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this \
could be leveraged as part of an exploit chain that could result in privilege escalation. Note \
that by default JMX endpoint is only bound locally.
We recommend users to:
- Upgrade to a non-vulnerable Apache James version
- Run Apache James isolated from other processes (docker - dedicated virtual machine)
- If possible turn off JMX
Credit:
Mal Aware (reporter)
Arnout Engelen (analyst)
References:
https://james.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-51518
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic