org.apache.james:james-server-data-file@3.0.0-beta5 vulnerabilities

  • latest version

    3.8.1

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    1 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.james:james-server-data-file package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Information Exposure

    Affected versions of this package are vulnerable to Information Exposure such that using temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit.

    Note: Vulnerable components include the SMTP stack and IMAP APPEND command.

    How to fix Information Exposure?

    Upgrade org.apache.james:james-server-data-file to version 3.7.3 or higher.

    [0,3.7.3)
    • M
    Directory Traversal

    Affected versions of this package are vulnerable to Directory Traversal via maildir mailbox store and Sieve file repository which enables a user to access other users' data stores.

    Note: This is due to an incomplete fix to CVE-2021-40525.

    How to fix Directory Traversal?

    Upgrade org.apache.james:james-server-data-file to version 3.6.2 or higher.

    [,3.6.2)
    • C
    Directory Traversal

    Affected versions of this package are vulnerable to Directory Traversal due to improper implementation of ManagedSieve and the file storage for sieve scripts, which allows attackers reading and writing any file.

    Note: This could also be mitigated by ensuring manageSieve is disabled, which is the case by default.

    How to fix Directory Traversal?

    Upgrade org.apache.james:james-server-data-file to version 3.6.2 or higher.

    [0,3.6.2)