Severity: moderate

Description:

Apache James server version 3.7.3 and earlier provides a JMX management service 
without authentication by default. This allows privilege escalation by a 
malicious local user.

Administrators are advised to disable JMX, or set up a JMX password.

Work Arounds:

Note that version 3.7.4 onward will set up a JMX password automatically for 
Guice users.

Credit:

Matei "Mal" Badanoiu (reporter)

References:

https://james.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-26269

Reply via email to