The JMX server, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. References: http://seclists.org/oss-sec/2017/q4/109
Created apache-james-project tracking bugs for this issue: Affects: epel-7 [bug 1504563] Affects: fedora-all [bug 1504562]