Apache Software Foundation Apache James vulnerabilities
7 known vulnerabilities affecting apache_software_foundation/apache_james.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH2MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2022-28220MEDIUMCVSS 5.9≥ Apache James, ≤ 3.6.22022-09-08
CVE-2022-28220 [MEDIUM] CWE-77 STARTTLS command injection in Apache JAMES
STARTTLS command injection in Apache JAMES
Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.
cvelistv5
CVE-2022-22931CRITICALCVSS 9.1vApache James 3.6.12022-02-07
CVE-2022-22931 [CRITICAL] CWE-22 Path traversal in Apache James 3.6.1
Path traversal in Apache James 3.6.1
Fix of CVE-2021-40525 do not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used).
cvelistv5
CVE-2021-40525CRITICALCVSS 9.1vApache James 3.6.12022-01-04
CVE-2021-40525 [CRITICAL] CWE-22 CVE-2021-40525: Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulner
Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacted.
cvelistv5nvd
CVE-2021-40110HIGHCVSS 7.5≥ Apache James, ≤ 3.6.02022-01-04
CVE-2021-40110 [HIGH] CVE-2021-40110: In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands t
In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE2J regular expression engine to execute regex in linear time w
cvelistv5nvd
CVE-2021-38542MEDIUMCVSS 5.9≥ Apache James, ≤ 3.6.22022-01-04
CVE-2021-38542 [MEDIUM] CWE-77 CVE-2021-38542: Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the ST
Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.
cvelistv5nvd
CVE-2021-40111MEDIUMCVSS 6.5≥ Apache James, ≤ 3.6.02022-01-04
CVE-2021-40111 [MEDIUM] CWE-835 CVE-2021-40111: In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND a
In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability.
cvelistv5nvd
CVE-2017-12628HIGHCVSS 7.8v3.0.02017-10-20
CVE-2017-12628 [HIGH] CWE-502 CVE-2017-12628: The JMX server embedded in Apache James, also used by the command line client is exposed to a java d
The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades the incriminated library.
cvelistv5nvd