关联漏洞
标题:
Apache ActiveMQ 代码问题漏洞
(CVE-2023-46604)
描述:Apache ActiveMQ是美国阿帕奇(Apache)基金会的一套开源的消息中间件,它支持Java消息服务、集群、Spring Framework等。 Apache ActiveMQ 5.15.16之前、5.16.7之前、5.17.6之前或5.18.3之前版本存在代码问题漏洞,该漏洞源于允许具有代理网络访问权限的远程攻击者通过操纵 OpenWire 协议中的序列化类类型来运行任意 shell 命令。
介绍
# CVE-2023-46604-RCE
# Vulnerability
A deserialization vulnerability in the OpenWire transport unmarshaller in Apache ActiveMQ.
</p>
Affected versions include 5.18.0 through to 5.18.2, 5.17.0 through to 5.17.5, 5.16.0 through to
</p>
5.16.6, and all versions before 5.15.16.
# Setup
Change the Values inside the <B>POC.XML</B> as your needs (Your Command)
</p>
Host the <B>POC.XML</B>
</p>
pass the <B>POC.XML</B> URL to the script using -u arg, either testing a single ip or list of ips
# How To Use:
```
options:
-h, --help show this help message and exit
-f FILE, --file FILE File with a list of ActiveMQ Server IPs
-i IP, --ip IP ActiveMQ Server IP or Host (single IP)
-p PORT, --port PORT ActiveMQ Server Port
-n THREADS, --threads THREADS
Number of threads
-t TIMEOUT, --timeout TIMEOUT
Connection timeout for each requests
-u URL, --url URL XML Url
```
# Details:
I'm not the author of the Exploit itself</br>
I just Coded it into automation process, using Python</br>
the credits goes to </B>X1r0z<B>
# LINKS:
https://github.com/X1r0z/ActiveMQ-RCE</br>
https://exp10it.cn/2023/10/apache-activemq-%E7%89%88%E6%9C%AC-5.18.3-rce-%E5%88%86%E6%9E%90/</br>
https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt
# Disclaimer:
This proof-of-concept exploit is intended for educational and research purposes only. The author and the platform where this code is shared do not condone or encourage any unauthorized or malicious use of this code. Use this code at your own risk. The author is not responsible for any misuse, damage, or consequences that may arise from utilizing this code. Always ensure that you have the appropriate permissions and legal authorization before testing or deploying any security-related tools or exploits.
[](https://hits.seeyoufarm.com)
文件快照
[4.0K] /data/pocs/e30ec858389ee4c667111d34e7db361d65fa4fee
├── [2.8K] CVE-2023-46604-RCE.py
├── [ 751] poc.xml
└── [2.1K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。