PT-2023-6605 · Apache+4 · Apache Activemq+4
Yejie@Threatbook.Cn
·
Published
2023-10-27
·
Updated
2026-03-05
·
CVE-2023-46604
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Apache ActiveMQ versions prior to 5.15.16, prior to 5.16.7, prior to 5.17.6, and prior to 5.18.3
Description
Apache ActiveMQ is vulnerable to Remote Code Execution (RCE). This vulnerability allows a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol, causing the broker to instantiate any class on the classpath. This flaw has been actively exploited in the wild by threat actors, including those deploying ransomware such as HelloKitty and Mauri, and has been observed being used to install malware like DripDropper and Kinsing. The vulnerability is tracked as CVE-2023-46604 and has a CVSS score of 10.0 (Critical). Exploitation has been observed through various methods, including the use of a publicly available PoC exploit and the deployment of malicious payloads via HTTP. The exploitation of this vulnerability has been linked to multiple threat actors and campaigns.
Recommendations
Upgrade Apache ActiveMQ to version 5.15.16 or later, version 5.16.7 or later, version 5.17.6 or later, or version 5.18.3 or later.
Exploit
Fix
LPE
RCE
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
APACHEACTIVEMQ_CVE2023_46604
BDU:2023-07372
BIT-ACTIVEMQ-2023-46604
CVE-2023-46604
DLA-3657-1
DLA-3936-1
DSA-5798-1
GHSA-CRG9-44H2-XW35
OESA-2023-1778
USN-6910-1
USN-7268-1
ZDI-24-440
Affected Products
Apache Activemq
Bamboo
Linuxmint
Red Os
Ubuntu
References · 381
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/apache_activemq_rce_cve_2023_46604.rb⭐ 37064 🔗 14661 · Exploit
- 🔥 https://github.com/X1r0z/ActiveMQ-RCE⭐ 253 🔗 32 · Exploit
- 🔥 https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ⭐ 120 🔗 40 · Exploit
- 🔥 https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max⭐ 64 🔗 3 · Exploit
- 🔥 https://github.com/evkl1d/CVE-2023-46604⭐ 40 🔗 12 · Exploit
- 🔥 https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit⭐ 39 🔗 4 · Exploit
- 🔥 https://github.com/sule01u/CVE-2023-46604⭐ 35 🔗 6 · Exploit
- 🔥 https://github.com/trganda/ActiveMQ-RCE⭐ 28 🔗 8 · Exploit
- 🔥 https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell⭐ 17 🔗 5 · Exploit
- 🔥 https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp⭐ 5 · Exploit
- 🔥 https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up⭐ 3 · Exploit
- 🔥 https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46604 · Security Note
- https://osv.dev/vulnerability/DSA-5798-1 · Vendor Advisory
- https://osv.dev/vulnerability/DLA-3936-1 · Vendor Advisory