Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.james/james-project
  4. ›
  5. CVE-2017-12628

CVE-2017-12628: Deserialization of Untrusted Data

May 17, 2022 (updated July 27, 2023)

The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades the incriminated library.

References

  • github.com/advisories/GHSA-xj7q-q94c-6wr3
  • nvd.nist.gov/vuln/detail/CVE-2017-12628
  • web.archive.org/web/20210124113233/http://www.securityfocus.com/bid/101532
  • www.mail-archive.com/server-user@james.apache.org/msg15633.html

Code Behaviors & Features

Detect and mitigate CVE-2017-12628 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.0.1

Fixed versions

  • 3.0.1

Solution

Upgrade to version 3.0.1 or above.

Impact 7.8 HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

maven/org.apache.james/james-project/CVE-2017-12628.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:27 +0000.