[ 
https://issues.apache.org/jira/browse/JAMES-3567?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Benoit Tellier closed JAMES-3567.
---------------------------------
    Resolution: Fixed

Mentioned dependencies are either updated or removed.

Closing.

> Apache James 3.6 has Critical Vulnerability in dependent libs
> -------------------------------------------------------------
>
>                 Key: JAMES-3567
>                 URL: https://issues.apache.org/jira/browse/JAMES-3567
>             Project: James Server
>          Issue Type: Improvement
>          Components: James Core
>    Affects Versions: 3.6.0
>         Environment: Docker Image: - apache/james:distributed-3.6.0 
>            Reporter: Rikin Patel
>            Priority: Major
>              Labels: vulnerability
>          Time Spent: 1.5h
>  Remaining Estimate: 0h
>
> /root/james-server-cassandra-guice.lib/netty-3.10.6.Final.jar: -
>     ->  HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length 
> header to be accompanied by a second Content-Length header, or by a 
> Transfer-Encoding header
>     -> HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header 
> that lacks a colon, which might be interpreted as a separate header with an 
> incorrect syntax, or might be interpreted as an "invalid fold.". Impacted 
> Image File(s): /root/james-server-cassandra-guice.lib/netty-3.10.6.Final.jar
> /root/james-server-cassandra-guice.lib/jgroups-3.6.13.Final.jar
>     ->  JGroups before 4.0 does not require the proper headers for the 
> ENCRYPT and AUTH protocols from nodes joining the cluster, which allows 
> remote attackers to bypass security restrictions and send and receive 
> messages within the cluster via unspecified vectors..



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org
For additional commands, e-mail: server-dev-h...@james.apache.org

Reply via email to