
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-40525 affects Apache James ManagedSieve implementation and its file storage for sieve scripts. The vulnerability was discovered and disclosed in January 2022, impacting Apache James versions prior to 3.6.1. The vulnerability affects the ManagedSieve implementation alongside the file storage for sieve scripts (OSS Security).
The vulnerability is classified as a path traversal vulnerability (CWE-22) that allows reading and writing of any file through the ManagedSieve implementation. It has received a CVSS v3.1 base score of 9.1 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, indicating high severity with network accessibility and no authentication required (NVD).
The vulnerability allows attackers to read and write any file through the ManagedSieve implementation, potentially leading to unauthorized access to sensitive data and system files. The issue affects file storage systems for sieve scripts, which could compromise the security of the entire system (OSS Security).
The vulnerability has been patched in Apache James version 3.6.1 and higher. For users unable to upgrade immediately, the vulnerability can be mitigated by ensuring manageSieve is disabled, which is the default configuration. Additionally, users of distributed and Cassandra-based products are not affected by this vulnerability (OSS Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."