一、 漏洞 CVE-2023-46604 基础信息
漏洞标题
Apache ActiveMQ,Apache ActiveMQ Legacy OpenWire Module: 由于反序列化无界,导致ActiveMQ易受远程代码执行(RCE)攻击
来源:AIGC 神龙大模型
漏洞描述信息
Apache ActiveMQ,Apache ActiveMQ Legacy OpenWire Module:无限序列化可能导致ActiveMQ受到远程代码执行(RCE)攻击
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
可信数据的反序列化
来源:AIGC 神龙大模型
漏洞标题
Apache ActiveMQ, Apache ActiveMQ Legacy OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
可信数据的反序列化
来源:美国国家漏洞数据库 NVD
漏洞标题
Apache ActiveMQ 代码问题漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Apache ActiveMQ是美国阿帕奇(Apache)基金会的一套开源的消息中间件,它支持Java消息服务、集群、Spring Framework等。 Apache ActiveMQ 5.15.16之前、5.16.7之前、5.17.6之前或5.18.3之前版本存在代码问题漏洞,该漏洞源于允许具有代理网络访问权限的远程攻击者通过操纵 OpenWire 协议中的序列化类类型来运行任意 shell 命令。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
代码问题
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2023-46604 的公开POC
# POC 描述 源链接 神龙链接
1 ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言 https://github.com/X1r0z/ActiveMQ-RCE POC详情
2 CVE-2023-46604 https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max POC详情
3 Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ POC详情
4 None https://github.com/evkl1d/CVE-2023-46604 POC详情
5 CVE-2023-46604 ActiveMQ RCE vulnerability verification/exploitation tool https://github.com/sule01u/CVE-2023-46604 POC详情
6 CVE-2023-46604 Apache ActiveMQ RCE exp 基于python https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp POC详情
7 None https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up POC详情
8 This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol. https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell POC详情
9 POC repo for CVE-2023-46604 https://github.com/vjayant93/CVE-2023-46604-POC POC详情
10 CVE-2023-46604环境复现包 https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence POC详情
11 None https://github.com/NKeshawarz/CVE-2023-46604-RCE POC详情
12 PY https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604 POC详情
13 None https://github.com/nitzanoligo/CVE-2023-46604-demo POC详情
14 Repository to exploit CVE-2023-46604 reported for ActiveMQ https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604 POC详情
15 CVE-2023-46604 https://github.com/trganda/ActiveMQ-RCE POC详情
16 Exploit for CVE-2023-46604 https://github.com/mrpentst/CVE-2023-46604 POC详情
17 None https://github.com/dcm2406/CVE-2023-46604 POC详情
18 CVE-2023-46604 - ApacheMQ Version 5.15.5 Vulnerability Machine: Broker https://github.com/Mudoleto/Broker_ApacheMQ POC详情
19 None https://github.com/hh-hunter/cve-2023-46604 POC详情
20 None https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604 POC详情
21 ActiveMQ RCE (CVE-2023-46604) 回显利用工具 https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit POC详情
22 None https://github.com/ph-hitachi/CVE-2023-46604 POC详情
23 A go-exploit for Apache ActiveMQ CVE-2023-46604 https://github.com/vulncheck-oss/cve-2023-46604 POC详情
24 activemq-rce-cve-2023-46604 https://github.com/thinkycx/activemq-rce-cve-2023-46604 POC详情
25 CVE-2023-46604 (Apache ActiveMQ RCE Vulnerability) and focused on getting Indicators of Compromise. https://github.com/mranv/honeypot.rs POC详情
26 El script explota una vulnerabilidad de deserialización insegura en Apache ActiveMQ (CVE-2023-46604) https://github.com/pulentoski/CVE-2023-46604 POC详情
27 None https://github.com/stegano5/ExploitScript-CVE-2023-46604 POC详情
28 None https://github.com/cuanh2333/CVE-2023-46604 POC详情
29 Repository to exploit CVE-2023-46604 reported for ActiveMQ https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate POC详情
30 Repository to exploit CVE-2023-46604 reported for ActiveMQ https://github.com/tomasmussi/activemq-cve-2023-46604 POC详情
31 None https://github.com/skrkcb2/CVE-2023-46604 POC详情
32 Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath. Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue. https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2023/CVE-2023-46604.yaml POC详情
33 None https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-46604.md POC详情
34 None https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20OpenWire%20%E5%8D%8F%E8%AE%AE%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-46604.md POC详情
35 https://github.com/vulhub/vulhub/blob/master/activemq/CVE-2023-46604/README.md POC详情
三、漏洞 CVE-2023-46604 的情报信息