支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2023-33246 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Apache RocketMQ: Possible remote code execution vulnerability when using the update configuration function
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
对生成代码的控制不恰当(代码注入)
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Apache RocketMQ 代码注入漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Apache RocketMQ是美国阿帕奇(Apache)基金会的一款轻量级的数据处理平台和消息传递引擎。 Apache RocketMQ 5.1.0及之前版本存在代码注入漏洞,该漏洞源于存在远程命令执行漏洞,攻击者可以利用该漏洞利用更新配置功能以系统用户身份执行命令。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Apache Software FoundationApache RocketMQ 0 ~ 5.1.0 -
二、漏洞 CVE-2023-33246 的公开POC
#POC 描述源链接神龙链接
1Nonehttps://github.com/I5N0rth/CVE-2023-33246POC详情
2Nonehttps://github.com/yizhimanpadewoniu/CVE-2023-33246-CopyPOC详情
3Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploithttps://github.com/Le1a/CVE-2023-33246POC详情
4Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploithttps://github.com/SuperZero/CVE-2023-33246POC详情
5CVE-2023-33246 RocketMQ RCE Detect By Version and Exploithttps://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOITPOC详情
6CVE-2023-33246:Apache RocketMQ 远程命令执行漏洞检测工具https://github.com/CKevens/CVE-2023-33246POC详情
7RocketMQ RCE (CVE-2023-33246) woodpecker 利用插件https://github.com/cr1me0/rocketMq_RCEPOC详情
8CVE-2023-33246https://github.com/Devil0ll/CVE-2023-33246POC详情
9CVE-2023-33246 POChttps://github.com/d0rb/CVE-2023-33246POC详情
10A tool to fetch the RocketMQ broker configuration in order to discover indicators of compromise for CVE-2023-33246https://github.com/vulncheck-oss/fetch-broker-confPOC详情
11CVE-2023-33246 - Apache RocketMQ config RCEhttps://github.com/0xKayala/CVE-2023-33246POC详情
12Nonehttps://github.com/MkJos/CVE-2023-33246_RocketMQ_RCE_EXPPOC详情
13Nonehttps://github.com/hanch7274/CVE-2023-33246POC详情
14CVE-2023-33246:Apache RocketMQ 远程命令执行漏洞检测工具https://github.com/3yujw7njai/CVE-2023-33246POC详情
15Nonehttps://github.com/PavilionQ/CVE-2023-33246-mitigationPOC详情
16Nonehttps://github.com/4mazing/CVE-2023-33246-CopyPOC详情
17Nonehttps://github.com/Sumitpathania03/Apache-RocketMQ-CVE-2023-33246-POC详情
18CVE-2023-33246:Apache RocketMQ 远程命令执行漏洞检测工具https://github.com/AiK1d/CVE-2023-33246POC详情
19For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x . https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2023/CVE-2023-33246.yamlPOC详情
20Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20RocketMQ%20Broker%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-33246.mdPOC详情
21https://github.com/vulhub/vulhub/blob/master/rocketmq/CVE-2023-33246/README.mdPOC详情
22Nonehttps://github.com/shoucheng3/apache__rocketmq_CVE-2023-33246_5-1-0POC详情
23CVE-2023-33246:Apache RocketMQ 远程命令执行漏洞检测工具https://github.com/P4x1s/CVE-2023-33246POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2023-33246 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2023-33246 的评论

暂无评论


发表评论