PT-2023-6605 · Apache +3 · Apache Activemq +3
Yejie@Threatbook.Cn
·
Published
2023-10-27
·
Updated
2025-08-20
·
CVE-2023-46604
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Apache ActiveMQ versions prior to 5.15.16, prior to 5.16.7, prior to 5.17.6, and prior to 5.18.3.
**Description:**
Apache ActiveMQ is vulnerable to a Remote Code Execution (RCE) vulnerability (CVE-2023-46604) due to insecure deserialization of data within the OpenWire protocol. Successful exploitation allows a remote, unauthenticated attacker to execute arbitrary shell commands on the server. This vulnerability has been actively exploited in the wild by ransomware groups, including HelloKitty and Mauri, and is also associated with the deployment of web shells like Godzilla. Numerous reports indicate a high number of vulnerable systems exposed online, particularly in China and the US. Exploitation has been observed as early as October 10, 2023.
**Recommendations:**
Upgrade Apache ActiveMQ to version 5.15.16 or later, 5.16.7 or later, 5.17.6 or later, or 5.18.3 or later.
Exploit
Fix
RCE
Deserialization of Untrusted Data
Weakness Enumeration
Related Identifiers
Affected Products
References · 349
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/apache_activemq_rce_cve_2023_46604.rb⭐ 35285 🔗 14255 · Exploit
- 🔥 https://github.com/X1r0z/ActiveMQ-RCE⭐ 239 🔗 30 · Exploit
- 🔥 https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ⭐ 114 🔗 39 · Exploit
- 🔥 https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max⭐ 62 🔗 3 · Exploit
- 🔥 https://github.com/evkl1d/CVE-2023-46604⭐ 30 🔗 11 · Exploit
- 🔥 https://github.com/sule01u/CVE-2023-46604⭐ 35 🔗 6 · Exploit
- 🔥 https://github.com/trganda/ActiveMQ-RCE⭐ 28 🔗 8 · Exploit
- 🔥 https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell⭐ 16 🔗 5 · Exploit
- 🔥 https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit⭐ 17 🔗 3 · Exploit
- 🔥 https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp⭐ 5 · Exploit
- 🔥 https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up⭐ 3 · Exploit
- 🔥 https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html · Exploit
- https://osv.dev/vulnerability/DLA-3657-1 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-6910-1 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/703867 · Security Note