7.8
CVSSv3

CVE-2023-26269

Published: 03/04/2023 Updated: 18/04/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Apache James server version 3.7.3 and previous versions provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache james

Github Repositories

CVE-2023-26269: Misconfigured JMX in Apache James

CVE-2023-26269: Misconfigured JMX in Apache James By default Apache James opens a JMXRMI service that listens on localhost, port 9999 Because the JMX is misconfigured to allow unauthenticated access, an attacker that has local access to the machine running James can use a “MLet attack” in order to load arbitrary MBeans and execute malicious Java code Because the a