This is an automated email from the ASF dual-hosted git repository.

btellier pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/james-project.git


The following commit(s) were added to refs/heads/master by this push:
     new 68434b2  [DOCUMENTATION] Mention Log4Shell on James security page 
(#864)
68434b2 is described below

commit 68434b2ed5f189aa234b6ca5489d9244de653522
Author: Benoit TELLIER <[email protected]>
AuthorDate: Mon Jan 31 10:09:07 2022 +0700

    [DOCUMENTATION] Mention Log4Shell on James security page (#864)
---
 src/site/xdoc/server/feature-security.xml | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/src/site/xdoc/server/feature-security.xml 
b/src/site/xdoc/server/feature-security.xml
index 2dd430d..3d88c75 100644
--- a/src/site/xdoc/server/feature-security.xml
+++ b/src/site/xdoc/server/feature-security.xml
@@ -53,6 +53,16 @@
             We follow the standard procedures within the ASF regarding
             <a 
href="https://apache.org/security/committers.html#vulnerability-handling";>vulnerability
 handling</a>.
         </subsection>
+        <subsection name="CVE-2021-44228: Log4Shell">
+            <p>Apache James Spring distribution prior to release 3.6.1 is 
vulnerable to attacks leveraging Log4Shell.
+            This can be leveraged to conduct remote code execution with only 
SMTP access.</p>
+
+            <p><b>Severity</b>: High</p>
+
+            <p><b>Mitigation</b>: We recommend to upgrade to Apache James 
3.6.1 or higher, which fixes this vulnerability.</p>
+
+            <p>Note: Guice distributions are not affected.</p>
+        </subsection>
         <subsection name="CVE-2021-38542: Apache James vulnerable to STARTTLS 
command injection (IMAP and POP3)">
             <p>Apache James prior to release 3.6.1 is vulnerable to a 
buffering attack relying on the use of the STARTTLS
                 command. This can result in Man-in -the-middle command 
injection attacks, leading potentially to leakage

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to