Apache ActiveMQ Remote Code Execution Exploit# CVE-2016-3088
Apache ActiveMQ Remote Code Execution Exploit
## Description
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.
## Author
* Alexandre Aguiar ([@cyberaguiar](https://cyberaguiar.com))
## Exploit analysis
* [Analysis of Apache ActiveMQ Remote Code Execution Vulnerability (CVE-2016–3088)](https://medium.com/@knownsec404team/analysis-of-apache-activemq-remote-code-execution-vulnerability-cve-2016-3088-575f80924f30)
## References
* https://nvd.nist.gov/vuln/detail/CVE-2016-3088
## Disclaimer
The developer of this script are not responsible for any misuse of this exploit we only encourage the ethical use of this script and to be used only when authorized to do so during a penetration test or similar. Any damages or misuse of this script is the responsibility of the individuals who use them unethically or with the intent to damage property.
[4.0K] /data/pocs/14f7a711d0e38938c96016f248aa7cb585e1d50c
├── [4.0K] exploit_activemq.py
├── [ 34K] LICENSE
└── [1004] README.md
0 directories, 3 files