Apache James JMX Auth Bypass (<=3.7.3)
CVE-2023-26269 Published on April 3, 2023
Apache James server: Privilege escalation through unauthenticated JMX
Apache James server version 3.7.3 and earlier provides a JMX management service without authentication by default. This allows privilege escalation by a
malicious local user.
Administrators are advised to disable JMX, or set up a JMX password.
Note that version 3.7.4 onward will set up a JMX password automatically for Guice users.
Vulnerability Analysis
CVE-2023-26269 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is an AuthZ Vulnerability?
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
CVE-2023-26269 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2023-26269
Want to know whenever a new CVE is published for Apache James? stack.watch will email you.
Affected Versions
Apache Software Foundation Apache James server:- Before and including 3.7.3 is affected.
- Before and including 3.7.3 is affected.
Vulnerable Packages
The following package name and versions may be associated with CVE-2023-26269
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| maven | io.antmedia:ant-media-server | >= 2.6.0, < 2.9.0 | 2.9.0 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.