icon

We found results for “

CVE-2022-45935

Good to know:

icon
icon

Date: January 6, 2023

Usage of temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit. Vulnerable components includes the SMTP stack and IMAP APPEND command. This issue affects Apache James server version 3.7.2 and prior versions.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Exposure of Resource to Wrong Sphere

CWE-668

Information Leak / Disclosure

CWE-200

Cleartext Transmission of Sensitive Information

CWE-319

Top Fix

icon

Upgrade Version

Upgrade to version org.apache.james:james-server-core:3.7.3, org.apache.james:apache-james-mailbox-store:3.7.3, org.apache.james:apache-mailet-standard:3.7.3, org.apache.james:james-server-protocols-imap4:3.7.3, org.apache.james:james-server-data-file:3.7.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us