vendor:
James Server
by:
Jakub Palaczynski, Marcin Woloszyn, Maciej Grabiec
9
CVSS
HIGH
Authenticated User Remote Command Execution
78
CWE
Product Name: James Server
Affected Version From: 2.3.2
Affected Version To: 2.3.2
Patch Exists: NO
Related CWE: N/A
CPE: a:apache:james_server:2.3.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu, Debian
2014
Apache James Server 2.3.2 Authenticated User Remote Command Execution
This exploit works on default installation of Apache James Server 2.3.2. It allows an authenticated user to execute arbitrary commands on the server. The exploit creates a user with a malicious payload in the /etc/bash_completion.d directory, which is then executed when the user logs in.
Mitigation:
Restrict access to the Apache James Server 2.3.2 Remote Administration Tool and SMTP server to trusted users and networks.