VYPR
High severity7.8NVD Advisory· Published Oct 20, 2017· Updated May 13, 2026

CVE-2017-12628

CVE-2017-12628

Description

The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades the incriminated library.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.james:james-projectMaven
< 3.0.13.0.1

Affected products

2
  • Apache Software Foundation/Apache Jamesv5
    Range: 3.0.0
  • cpe:2.3:a:apache:james_server:*:*:*:*:*:*:*:*
    Range: <=3.0.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.