SB2016060701 - Command injection in Apache James Server



SB2016060701 - Command injection in Apache James Server

Published: June 7, 2016 Updated: February 25, 2020

Security Bulletin ID SB2016060701
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Path traversal (CVE-ID: CVE-2015-7611)

The vulnerability allows a remote authenticated user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences within username when creating new user account in Apache James Remote Administration Tool. A remote authenticated user can send a specially crafted POP3 request to create a user with malicious username and then execute the code, stored in the username by sending an email to this particular recipient.


Remediation

Install update from vendor's website.