First published: Tue Jan 04 2022(Updated: )
Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacted.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache James | <3.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file.
The severity of CVE-2021-40525 is critical (9.1).
You can fix CVE-2021-40525 by upgrading to Apache James 3.6.1 or higher.
You can find more information about CVE-2021-40525 on the following references: [1](http://www.openwall.com/lists/oss-security/2022/01/04/4) [2](http://www.openwall.com/lists/oss-security/2022/02/07/1) [3](https://www.openwall.com/lists/oss-security/2022/01/04/4)