Description
Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.
No analysis available yet.
Remediation
Vendor Workaround
We recommend to upgrade to Apache James 3.6.1, which fixes this vulnerability. Furthermore, we recommend, if possible to dis-activate STARTTLS and rely solely on explicit TLS for mail protocols, including SMTP, IMAP and POP3.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0517 | Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information. |
Github GHSA |
GHSA-84wg-rgp8-2hg4 | Command Injection in Apache James |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T01:44:23.485Z
Reserved: 2021-08-11T00:00:00.000Z
Link: CVE-2021-38542
No data.
Status : Modified
Published: 2022-01-04T09:15:07.267
Modified: 2024-11-21T06:17:23.503
Link: CVE-2021-38542
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA