Vulnerability Description
Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | James Server | 2.3.2 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/133798/Apache-James-Server-2.3.2-Arbitrary-
- http://packetstormsecurity.com/files/156463/Apache-James-Server-2.3.2-Insecure-U
- http://www.openwall.com/lists/oss-security/2015/09/30/7
- http://www.openwall.com/lists/oss-security/2015/10/01/2
- http://www.securityfocus.com/archive/1/536575/100/0/threaded
- https://blogs.apache.org/james/entry/apache_james_server_2_3Vendor Advisory
- http://packetstormsecurity.com/files/133798/Apache-James-Server-2.3.2-Arbitrary-
- http://packetstormsecurity.com/files/156463/Apache-James-Server-2.3.2-Insecure-U
- http://www.openwall.com/lists/oss-security/2015/09/30/7
- http://www.openwall.com/lists/oss-security/2015/10/01/2
- http://www.securityfocus.com/archive/1/536575/100/0/threaded
- https://blogs.apache.org/james/entry/apache_james_server_2_3Vendor Advisory
FAQ
What is CVE-2015-7611?
CVE-2015-7611 is a vulnerability with a CVSS score of 8.1 (HIGH). Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.
How severe is CVE-2015-7611?
CVE-2015-7611 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7611?
Check the references section above for vendor advisories and patch information. Affected products include: Apache James Server.