org.apache.james:apache-james-mpt-smtp-core@3.6.0 vulnerabilities

  • latest version

    3.9.0

  • latest non vulnerable version

  • first published

    8 years ago

  • latest version published

    23 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.james:apache-james-mpt-smtp-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Arbitrary Command Injection

    Affected versions of this package are vulnerable to Arbitrary Command Injection via the STARTTLS command. This can lead to a leak of sensible information.

    Note: another remediation option is to deactivate STARTTLS and rely solely on explicit TLS for mail protocols, including SMTP, IMAP and POP3.

    How to fix Arbitrary Command Injection?

    Upgrade org.apache.james:apache-james-mpt-smtp-core to version 3.6.2 or higher.

    [0,3.6.2)