POC详情: 14f7a711d0e38938c96016f248aa7cb585e1d50c

来源
关联漏洞
标题: Apache ActiveMQ 输入验证错误漏洞 (CVE-2016-3088)
描述:Apache ActiveMQ是美国阿帕奇(Apache)软件基金会的一套开源的消息中间件,它支持Java消息服务、集群、Spring Framework等。 Apache ActiveMQ 5.14.0之前5.x版本的Fileserver Web应用中存在安全漏洞。远程攻击者可通过发送HTTP PUT和HTTP MOVE请求利用该漏洞上传并执行任意文件。
描述
Apache ActiveMQ Remote Code Execution Exploit
介绍
# CVE-2016-3088

Apache ActiveMQ Remote Code Execution Exploit

## Description

The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.

## Author

* Alexandre Aguiar ([@cyberaguiar](https://cyberaguiar.com))


## Exploit analysis

* [Analysis of Apache ActiveMQ Remote Code Execution Vulnerability (CVE-2016–3088)](https://medium.com/@knownsec404team/analysis-of-apache-activemq-remote-code-execution-vulnerability-cve-2016-3088-575f80924f30)

## References

* https://nvd.nist.gov/vuln/detail/CVE-2016-3088

## Disclaimer

The developer of this script are not responsible for any misuse of this exploit we only encourage the ethical use of this script and to be used only when authorized to do so during a penetration test or similar. Any damages or misuse of this script is the responsibility of the individuals who use them unethically or with the intent to damage property.
文件快照

[4.0K] /data/pocs/14f7a711d0e38938c96016f248aa7cb585e1d50c ├── [4.0K] exploit_activemq.py ├── [ 34K] LICENSE └── [1004] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。