CVE-2023-51518
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
27/02/2024
Last modified:
05/05/2025
Description
Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data.<br />
Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation.<br />
Note that by default JMX endpoint is only bound locally.<br />
<br />
We recommend users to:<br />
- Upgrade to a non-vulnerable Apache James version<br />
<br />
- Run Apache James isolated from other processes (docker - dedicated virtual machine)<br />
- If possible turn off JMX<br />
<br />
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apache:james:3.7.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:james:3.8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page