Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2015-7611

Severity
8.1HIGH
EPSS
74.9%
top 1.13%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 7
Latest updateMay 14

Description

Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

3
GHSA
Apache James Server OS Command Injection2022-05-14
OSV
Apache James Server OS Command Injection2022-05-14
CVEList
CVE-2015-7611: Apache James Server 22016-06-07

💥Exploits & PoCs

1
Exploit-DB
Apache James Server 2.3.2 - Insecure User Creation Arbitrary File Write (Metasploit)2020-02-24

💬Community

1
Bugzilla
CVE-2015-7611 apache-james-project: arbitrary command execution for servers configured with file based user repositories2015-10-01
CVE-2015-7611 (HIGH CVSS 8.1) | Apache James Server 2.3.2 | cvebase.io