Apache James server allows an attacker with local access to access private user data in transit
Moderate severity
GitHub Reviewed
Published
Jan 6, 2023
to the GitHub Advisory Database
•
Updated Jul 7, 2023
Description
Published by the National Vulnerability Database
Jan 6, 2023
Published to the GitHub Advisory Database
Jan 6, 2023
Reviewed
Jan 9, 2023
Last updated
Jul 7, 2023
Usage of temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit. Vulnerable components includes the SMTP stack and IMAP APPEND command. This issue affects Apache James server version 3.7.2 and prior versions.
References