Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0517 Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.
Github GHSA Github GHSA GHSA-84wg-rgp8-2hg4 Command Injection in Apache James
Fixes

Solution

No solution given by the vendor.


Workaround

We recommend to upgrade to Apache James 3.6.1, which fixes this vulnerability. Furthermore, we recommend, if possible to dis-activate STARTTLS and rely solely on explicit TLS for mail protocols, including SMTP, IMAP and POP3.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T01:44:23.485Z

Reserved: 2021-08-11T00:00:00

Link: CVE-2021-38542

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-04T09:15:07.267

Modified: 2024-11-21T06:17:23.503

Link: CVE-2021-38542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.