Information Exposure Affecting org.apache.james:apache-james-mailbox-store package, versions [0,3.7.3)


0.0
medium

Snyk CVSS

    Attack Complexity Low

    Threat Intelligence

    EPSS 0.04% (6th percentile)
Expand this section
NVD
5.5 medium
Expand this section
Red Hat
5.5 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGAPACHEJAMES-3226745
  • published 6 Jan 2023
  • disclosed 6 Jan 2023
  • credit Benoit Tellier

How to fix?

Upgrade org.apache.james:apache-james-mailbox-store to version 3.7.3 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure such that using temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit.

Note: Vulnerable components include the SMTP stack and IMAP APPEND command.