Information Exposure Affecting org.apache.james:apache-james-mailbox-store package, versions [0,3.7.3)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHEJAMES-3226745
  • published6 Jan 2023
  • disclosed6 Jan 2023
  • creditBenoit Tellier

Introduced: 6 Jan 2023

CVE-2022-45935  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.apache.james:apache-james-mailbox-store to version 3.7.3 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure such that using temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit.

Note: Vulnerable components include the SMTP stack and IMAP APPEND command.

CVSS Scores

version 3.1