<p># Exploit Title: Apache James Server 2.3.2 Authenticated User Remote Command Execution</p><p># Date: 16\10\2014</p><p># Vendor Homepage: <a href="http://james.apache.org/server/">http://james.apache.org/server/</a></p><p># Software Link: <a href="http://ftp.ps.pl/pub/apache/james/server/apache-james-2.3.2.zip">http://ftp.ps.pl/pub/apache/james/server/apache-james-2.3.2.zip</a></p><p># 版本: Apache James Server 2.3.2</p><p># Tested on: Ubuntu, Debian</p>
<p># Exploit Title: Apache James Server 2.3.2 Authenticated User Remote Command Execution</p><p># Date: 16\10\2014</p><p># Vendor Homepage: <a href="http://james.apache.org/server/">http://james.apache.org/server/</a></p><p># Software Link: <a href="http://ftp.ps.pl/pub/apache/james/server/apache-james-2.3.2.zip">http://ftp.ps.pl/pub/apache/james/server/apache-james-2.3.2.zip</a></p><p># 版本: Apache James Server 2.3.2</p><p># Tested on: Ubuntu, Debian</p>