CVE-2015-7611: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.
References
- packetstormsecurity.com/files/133798/Apache-James-Server-2.3.2-Arbitrary-Command-Execution.html
- packetstormsecurity.com/files/156463/Apache-James-Server-2.3.2-Insecure-User-Creation-Arbitrary-File-Write.html
- www.openwall.com/lists/oss-security/2015/09/30/7
- www.openwall.com/lists/oss-security/2015/10/01/2
- blogs.apache.org/james/entry/apache_james_server_2_3
- github.com/advisories/GHSA-cgvf-22vv-83h5
- nvd.nist.gov/vuln/detail/CVE-2015-7611
- web.archive.org/web/20201207092339/http://www.securityfocus.com/archive/1/536575/100/0/threaded
Detect and mitigate CVE-2015-7611 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →