Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.
References
Configurations
History
21 Nov 2024, 02:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/133798/Apache-James-Server-2.3.2-Arbitrary-Command-Execution.html - | |
References | () http://packetstormsecurity.com/files/156463/Apache-James-Server-2.3.2-Insecure-User-Creation-Arbitrary-File-Write.html - | |
References | () http://www.openwall.com/lists/oss-security/2015/09/30/7 - | |
References | () http://www.openwall.com/lists/oss-security/2015/10/01/2 - | |
References | () http://www.securityfocus.com/archive/1/536575/100/0/threaded - | |
References | () https://blogs.apache.org/james/entry/apache_james_server_2_3 - Vendor Advisory |
Information
Published : 2016-06-07 14:06
Updated : 2025-04-12 10:46
NVD link : CVE-2015-7611
Mitre link : CVE-2015-7611
CVE.ORG link : CVE-2015-7611
JSON object : View
Products Affected
apache
- james_server
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')