POC详情: b0bf4bc1dc26d4ea5f434d65b822528b5e7caea4

来源
关联漏洞
标题: Apache RocketMQ 代码注入漏洞 (CVE-2023-33246)
描述:Apache RocketMQ是美国阿帕奇(Apache)基金会的一款轻量级的数据处理平台和消息传递引擎。 Apache RocketMQ 5.1.0及之前版本存在代码注入漏洞,该漏洞源于存在远程命令执行漏洞,攻击者可以利用该漏洞利用更新配置功能以系统用户身份执行命令。
介绍
# CVE-2023-33246-mitigation

This project is a Maven-based demonstration of mitigating CVE-2023-33246, a vulnerability in Apache RocketMQ.

## Project Structure

- `org/example/Main.java`: The main program file.
- `org/apache/rocketmq/common/BrokerConfig.java`: Modified version of the official RocketMQ 4.9.5 source code.

## Main Features

1. **Attack Testing**: The `updateConfig` method in `Main.java` is used for attack testing purposes.

2. **Enhanced Validation**: The `BrokerConfig.java` file includes a new method `getValidatedRocketmqHome()`. This method strengthens the validation of the `RocketmqHome` parameter to prevent potential attacks.

## Base Source Code

This project is based on Apache RocketMQ 4.9.5. The complete official source code can be downloaded from:

[RocketMQ 4.9.5 Source Release](https://dist.apache.org/repos/dist/release/rocketmq/4.9.5/rocketmq-all-4.9.5-source-release.zip)
文件快照

[4.0K] /data/pocs/b0bf4bc1dc26d4ea5f434d65b822528b5e7caea4 ├── [1.0K] pom.xml ├── [ 912] README.md └── [4.0K] src └── [4.0K] main └── [4.0K] java └── [4.0K] org ├── [4.0K] apache │   └── [4.0K] rocketmq │   └── [4.0K] common │   └── [ 27K] BrokerConfig.java └── [4.0K] example └── [2.5K] Main.java 8 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。