Deserialization of Untrusted Data in Apache James - CVE-2017-12628
Published: February 25, 2020
Apache James
Detailed vulnerability description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insecure input validation when processing serialized data within the JMX server, bundled with Apache James. A local user can pass specially crafted data to the JMX socket and execute arbitrary code on the target system with elevated privileges.