First published: Mon Apr 03 2023(Updated: )
Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a malicious local user. Administrators are advised to disable JMX, or set up a JMX password. Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache James | <3.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26269 is a vulnerability in Apache James server version 3.7.3 and earlier that allows privilege escalation by a malicious local user.
CVE-2023-26269 has a severity of 7.8 (High).
CVE-2023-26269 affects Apache James server version 3.7.3 and earlier by providing a JMX management service without authentication by default.
Administrators are advised to disable JMX or set up a JMX password to mitigate CVE-2023-26269.
Yes, you can find more information about CVE-2023-26269 at the following references: [1](http://www.openwall.com/lists/oss-security/2023/04/18/3), [2](https://lists.apache.org/thread/2z44rg93pflbjhvbwy3xtz505bx41cbs).