一、 漏洞 CVE-2023-46604 基础信息
漏洞信息
                                        # Apache ActiveMQ,Apache ActiveMQ Legacy OpenWire Module: 由于反序列化无界,导致ActiveMQ易受远程代码执行(RCE)攻击

## 漏洞概述
Java OpenWire 协议的序列化处理程序存在远程代码执行漏洞。攻击者可以通过操纵 OpenWire 协议中的序列化类类型,导致客户端或代理实例化任意类路径上的类,从而执行任意 shell 命令。

## 影响版本
- 5.15.x (低于 5.15.16)
- 5.16.x (低于 5.16.7)
- 5.17.x (低于 5.17.6)
- 5.18.x (低于 5.18.3)

## 细节
此漏洞允许具备网络访问权限的远程攻击者通过操纵 OpenWire 协议中的序列化类类型,导致 Java 基础的 OpenWire 代理或客户端实例化任意类路径上的类,进而执行任意 shell 命令。

## 影响
该漏洞可能导致远程代码执行,攻击者可以利用此漏洞通过网络直接控制或攻击使用受影响版本的 Java OpenWire 协议的客户端或代理。

## 解决方案
建议用户更新到修复该漏洞的版本:5.15.16、5.16.7、5.17.6 或 5.18.3。
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Apache ActiveMQ, Apache ActiveMQ Legacy OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
可信数据的反序列化
来源:美国国家漏洞数据库 NVD
漏洞标题
Apache ActiveMQ 代码问题漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Apache ActiveMQ是美国阿帕奇(Apache)基金会的一套开源的消息中间件,它支持Java消息服务、集群、Spring Framework等。 Apache ActiveMQ 5.15.16之前、5.16.7之前、5.17.6之前或5.18.3之前版本存在代码问题漏洞,该漏洞源于允许具有代理网络访问权限的远程攻击者通过操纵 OpenWire 协议中的序列化类类型来运行任意 shell 命令。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
代码问题
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2023-46604 的公开POC
# POC 描述 源链接 神龙链接
1 ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言 https://github.com/X1r0z/ActiveMQ-RCE POC详情
2 CVE-2023-46604 https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max POC详情
3 Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ POC详情
4 None https://github.com/evkl1d/CVE-2023-46604 POC详情
5 CVE-2023-46604 ActiveMQ RCE vulnerability verification/exploitation tool https://github.com/sule01u/CVE-2023-46604 POC详情
6 CVE-2023-46604 Apache ActiveMQ RCE exp 基于python https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp POC详情
7 None https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up POC详情
8 This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol. https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell POC详情
9 POC repo for CVE-2023-46604 https://github.com/vjayant93/CVE-2023-46604-POC POC详情
10 CVE-2023-46604环境复现包 https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence POC详情
11 None https://github.com/NKeshawarz/CVE-2023-46604-RCE POC详情
12 PY https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604 POC详情
13 None https://github.com/nitzanoligo/CVE-2023-46604-demo POC详情
14 Repository to exploit CVE-2023-46604 reported for ActiveMQ https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604 POC详情
15 CVE-2023-46604 https://github.com/trganda/ActiveMQ-RCE POC详情
16 Exploit for CVE-2023-46604 https://github.com/mrpentst/CVE-2023-46604 POC详情
17 None https://github.com/dcm2406/CVE-2023-46604 POC详情
18 CVE-2023-46604 - ApacheMQ Version 5.15.5 Vulnerability Machine: Broker https://github.com/Mudoleto/Broker_ApacheMQ POC详情
19 None https://github.com/hh-hunter/cve-2023-46604 POC详情
20 None https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604 POC详情
21 ActiveMQ RCE (CVE-2023-46604) 回显利用工具 https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit POC详情
22 None https://github.com/ph-hitachi/CVE-2023-46604 POC详情
23 A go-exploit for Apache ActiveMQ CVE-2023-46604 https://github.com/vulncheck-oss/cve-2023-46604 POC详情
24 activemq-rce-cve-2023-46604 https://github.com/thinkycx/activemq-rce-cve-2023-46604 POC详情
25 CVE-2023-46604 (Apache ActiveMQ RCE Vulnerability) and focused on getting Indicators of Compromise. https://github.com/mranv/honeypot.rs POC详情
26 El script explota una vulnerabilidad de deserialización insegura en Apache ActiveMQ (CVE-2023-46604) https://github.com/pulentoski/CVE-2023-46604 POC详情
27 None https://github.com/stegano5/ExploitScript-CVE-2023-46604 POC详情
28 None https://github.com/cuanh2333/CVE-2023-46604 POC详情
29 Repository to exploit CVE-2023-46604 reported for ActiveMQ https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate POC详情
30 Repository to exploit CVE-2023-46604 reported for ActiveMQ https://github.com/tomasmussi/activemq-cve-2023-46604 POC详情
31 None https://github.com/skrkcb2/CVE-2023-46604 POC详情
32 Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath. Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue. https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2023/CVE-2023-46604.yaml POC详情
33 None https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-46604.md POC详情
34 None https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20OpenWire%20%E5%8D%8F%E8%AE%AE%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-46604.md POC详情
35 https://github.com/vulhub/vulhub/blob/master/activemq/CVE-2023-46604/README.md POC详情
三、漏洞 CVE-2023-46604 的情报信息