what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Apache James Server 2.3.2 Arbitrary Command Execution

Apache James Server 2.3.2 Arbitrary Command Execution
Posted Oct 1, 2015
Authored by Jakub Palaczynski

Apache James Server version 2.3.2 suffers from an arbitrary command execution vulnerability.

tags | advisory, arbitrary
SHA-256 | 26ae7acec4f69a123fe370fbec1b701a4575bc405486c9ecc68c669388c07534

Apache James Server 2.3.2 Arbitrary Command Execution

Change Mirror Download
Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: James Server 2.3.2

Description: Apache James Server 2.3.2 has security issue that can let a
user execute arbitrary system command for servers configured with file
based user repositories.

Mitigation: 2.3.2 users should upgrade to 2.3.2.1 to be downloaded from
http://james.apache.org/download.cgi#Apache_James_Server

Credit: This issue was discovered by Palaczynski Jakub
<Jakub.Palaczynski@ingservicespolska.pl> (recorded as VU#988628 by CERT)
Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close