logo

CVE-2024-45626 org.apache.james:james-server-jmap-draft

Package

Manager: maven
Name: org.apache.james:james-server-jmap-draft
Vulnerable Version: >=3.8.0 <3.8.2 || >=0 <3.7.6

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0058 pctl0.67935

Details

Apache James vulnerable to denial of service through JMAP HTML to text conversion Apache James server JMAP HTML to text plain implementation in versions below 3.8.2 and 3.7.6 is subject to unbounded memory consumption that can result in a denial of service. Users are recommended to upgrade to version 3.7.6 and 3.8.2, which fix this issue.

Metadata

Created: 2025-02-06T12:31:58Z
Modified: 2025-02-11T19:04:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-57m2-h3fw-rxhw/GHSA-57m2-h3fw-rxhw.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-57m2-h3fw-rxhw
Finding: F002
Auto approve: 1