Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-36041 PoC — IBM MQ Operator 信任管理问题漏洞

Source
Associated Vulnerability
Title:IBM MQ Operator 信任管理问题漏洞 (CVE-2025-36041)
Description:IBM MQ Operator是美国国际商业机器(IBM)公司的一种用于管理 IBM MQ 队列管理器生命周期的工具。 IBM MQ Operator存在信任管理问题漏洞,该漏洞源于配置不当可能导致敏感信息泄露或未授权操作。以下版本受到影响:IBM MQ Operator LTS 2.0.0至2.0.29版本,CD 3.0.0版本、3.0.1版本、3.1.0至3.1.3版本、3.3.0版本、3.4.0版本、3.4.1版本、3.5.0版本、3.5.1至3.5.3版本和SC2 3.2.0至3.2.12版本。
Description
Exploit (C) of the CVE-2025-36041 vulnerability in IBM MQ
Readme
# CVE-2025-36041 IBM MQ SSL Bypass Exploit

## Overview

This repository contains a proof-of-concept (PoC) exploit for **CVE-2025-36041**, a vulnerability in IBM MQ (Message Queue) that allows bypassing SSL certificate validation. By injecting a fake SSL certificate and using customized MQCONNX parameters, an unauthorized client connection to an IBM MQ server can be established.

## Features

* **SSL Bypass**: Injects a fake SSL KeyRepository to disable server certificate validation.
* **Automated Exploit**: Opens a specified queue and sends a test message (`"Hello MQ"`) to confirm successful exploitation.
* **Customizable**: Specify the target queue manager, queue name, and path to the fake SSL repository via command-line arguments.

## Prerequisites

* **IBM MQ Client SDK** (headers and libraries)
* **argparse.h** (for command-line parsing)
* **GCC** (or compatible C compiler)

Ensure IBM MQ client libraries are installed and environment variables (`MQ_INCLUDE_PATH`, `MQ_LIB_PATH`) are set accordingly.

## Building

gcc exploit.c argparse.c -o CVE-2025-36041 \
    -I/path/to/mqm/include \
    -L/path/to/mqm/lib -lmqm


## Usage

./CVE-2025-36041 \
    -p /path/to/fake/ssl \
    -n TARGET.QUEUE.NAME \
    -m QM1

**Parameters:**

* `-p, --path`    Path to the fake SSL KeyRepository directory.
* `-n, --name`    Target queue name to open and send message.
* `-m, --qmgr`    Queue Manager name.

## Example


./CVE-2025-36041 -p ./fake_ssl_repo -n MY.QUEUE -m QM1


If successful, you will see:


[+] Starting connection to IBM MQ...
[+] Connected successfully with fake SSL!
[+] Message sent successfully!

## Disclaimer

**For authorized penetration testing and educational purposes only.**
Unauthorized use of this PoC may violate local laws and regulations. The author assumes no liability for misuse.

---

*Author:* Byte Reaper
*CVE:* CVE-2025-36041

File Snapshot

[4.0K] /data/pocs/3659c665856f616931e2910e4491e1c0c8b9080f ├── [ 14K] end.txt ├── [7.5K] exploit.c ├── [1.0K] LICENSE └── [1.9K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.