Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-3088 PoC — Apache ActiveMQ 输入验证错误漏洞

Source
Associated Vulnerability
Title:Apache ActiveMQ 输入验证错误漏洞 (CVE-2016-3088)
Description:Apache ActiveMQ是美国阿帕奇(Apache)软件基金会的一套开源的消息中间件,它支持Java消息服务、集群、Spring Framework等。 Apache ActiveMQ 5.14.0之前5.x版本的Fileserver Web应用中存在安全漏洞。远程攻击者可通过发送HTTP PUT和HTTP MOVE请求利用该漏洞上传并执行任意文件。
Description
Apache ActiveMQ Remote Code Execution Exploit
Readme
# CVE-2016-3088

Apache ActiveMQ Remote Code Execution Exploit

## Description

The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.

## Author

* Alexandre Aguiar ([@cyberaguiar](https://cyberaguiar.com))


## Exploit analysis

* [Analysis of Apache ActiveMQ Remote Code Execution Vulnerability (CVE-2016–3088)](https://medium.com/@knownsec404team/analysis-of-apache-activemq-remote-code-execution-vulnerability-cve-2016-3088-575f80924f30)

## References

* https://nvd.nist.gov/vuln/detail/CVE-2016-3088

## Disclaimer

The developer of this script are not responsible for any misuse of this exploit we only encourage the ethical use of this script and to be used only when authorized to do so during a penetration test or similar. Any damages or misuse of this script is the responsibility of the individuals who use them unethically or with the intent to damage property.
File Snapshot

[4.0K] /data/pocs/14f7a711d0e38938c96016f248aa7cb585e1d50c ├── [4.0K] exploit_activemq.py ├── [ 34K] LICENSE └── [1004] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.