Bug 1504561 (CVE-2017-12628) - CVE-2017-12628 apache-james-project: Java deserialization in the JMX server
Summary: CVE-2017-12628 apache-james-project: Java deserialization in the JMX server
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2017-12628
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1504562 1504563
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-10-20 08:27 UTC by Andrej Nemec
Modified: 2019-09-29 14:24 UTC (History)
5 users (show)

Fixed In Version: Apache James 3.0.1
Clone Of:
Environment:
Last Closed: 2017-10-20 13:43:47 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2017-10-20 08:27:53 UTC
The JMX server, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation.

References:

http://seclists.org/oss-sec/2017/q4/109

Comment 1 Andrej Nemec 2017-10-20 08:28:17 UTC
Created apache-james-project tracking bugs for this issue:

Affects: epel-7 [bug 1504563]
Affects: fedora-all [bug 1504562]


Note You need to log in before you can comment on or make changes to this bug.