High severity8.1NVD Advisory· Published Jun 7, 2016· Updated May 6, 2026
CVE-2015-7611
CVE-2015-7611
Description
Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.james:james-serverMaven | < 2.3.2.1 | 2.3.2.1 |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- blogs.apache.org/james/entry/apache_james_server_2_3nvdVendor AdvisoryWEB
- github.com/advisories/GHSA-cgvf-22vv-83h5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2015-7611ghsaADVISORY
- packetstormsecurity.com/files/133798/Apache-James-Server-2.3.2-Arbitrary-Command-Execution.htmlnvdWEB
- packetstormsecurity.com/files/156463/Apache-James-Server-2.3.2-Insecure-User-Creation-Arbitrary-File-Write.htmlnvdWEB
- www.openwall.com/lists/oss-security/2015/09/30/7nvdWEB
- www.openwall.com/lists/oss-security/2015/10/01/2nvdWEB
- web.archive.org/web/20201207092339/http://www.securityfocus.com/archive/1/536575/100/0/threadedghsaWEB
- www.securityfocus.com/archive/1/536575/100/0/threadednvd
News mentions
0No linked articles in our index yet.