logo

CVE-2021-40110 org.apache.james:james-server

Package

Manager: maven
Name: org.apache.james:james-server
Vulnerable Version: >=3.1.0 <3.6.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.0078 pctl0.72805

Details

Denial of Service in Apache James In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE2J regular expression engine to execute regex in linear time without back-tracking.

Metadata

Created: 2022-01-08T00:40:30Z
Modified: 2024-05-15T06:30:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-r58x-wjg8-63m9/GHSA-r58x-wjg8-63m9.json
CWE IDs: []
Alternative ID: GHSA-r58x-wjg8-63m9
Finding: F211
Auto approve: 1