CVE-2023-26269

Severity
7.8HIGH
EPSS
1.0%
top 22.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3
Latest updateApr 22

Description

Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

🔴Vulnerability Details

4
GHSA
Ant Media Server vulnerable to a local privilege escalation2024-04-22
CVEList
Apache James server: Privilege escalation through unauthenticated JMX2023-04-03
OSV
Apache James server's JMX management service vulnerable to privilege escalation by local user2023-04-03
GHSA
Apache James server's JMX management service vulnerable to privilege escalation by local user2023-04-03
CVE-2023-26269 (HIGH CVSS 7.8) | Apache James server version 3.7.3 a | cvebase.io