Step 1: Target Identification: The attacker identifies a vulnerable Apache Tomcat server using JavaMail API versions 1.1.3 through 1.3, potentially running a web application that uses this API. Step 2: Endpoint Discovery: The attacker identifies the ReadMessage.jsp endpoint, likely located under a directory like /mailboxesdir/. Step 3: Crafting the Request: The attacker crafts a direct HTTP request to the vulnerable endpoint, specifying the target user's email address and potentially the attachment filename. Step 4: Bypassing Authentication: The attacker leverages the lack of proper access control to bypass any authentication or authorization mechanisms. Step 5: Attachment Retrieval: The server, due to the flawed logic, serves the requested attachment, granting unauthorized access to the attacker.