PT-2023-6605 · Apache +3 · Apache Activemq +3
Yejie@Threatbook.Cn
·
Published
2023-10-27
·
Updated
2025-10-14
·
CVE-2023-46604
CVSS v3.1
10
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Apache ActiveMQ versions prior to 5.15.16
Apache ActiveMQ versions prior to 5.16.7
Apache ActiveMQ versions prior to 5.17.6
Apache ActiveMQ versions prior to 5.18.3
Description
The Java OpenWire protocol marshaller in Apache ActiveMQ is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker to instantiate any class on the classpath. The estimated number of potentially affected devices worldwide is over 3,000 servers. There have been real-world incidents where this issue was exploited, including the installation of HelloKitty ransomware and other malware.
Recommendations
To resolve the issue for each affected version, users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.
As a temporary workaround, consider disabling the vulnerable OpenWire protocol until a patch is available.
Restrict access to the vulnerable Apache ActiveMQ servers to minimize the risk of exploitation.
Avoid using the vulnerable Java OpenWire protocol marshaller in the affected Apache ActiveMQ versions until the issue is resolved.
Exploit
Fix
RCE
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
APACHEACTIVEMQ_CVE2023_46604
BDU:2023-07372
BIT-ACTIVEMQ-2023-46604
CVE-2023-46604
DLA-3657-1
DLA-3936-1
DSA-5798-1
GHSA-CRG9-44H2-XW35
OESA-2023-1778
USN-6910-1
USN-7268-1
ZDI-24-440
Affected Products
Apache Activemq
Bamboo
Linuxmint
Ubuntu
References · 367
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/apache_activemq_rce_cve_2023_46604.rb⭐ 35285 🔗 14255 · Exploit
- 🔥 https://github.com/X1r0z/ActiveMQ-RCE⭐ 248 🔗 31 · Exploit
- 🔥 https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ⭐ 114 🔗 39 · Exploit
- 🔥 https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max⭐ 62 🔗 3 · Exploit
- 🔥 https://github.com/evkl1d/CVE-2023-46604⭐ 30 🔗 11 · Exploit
- 🔥 https://github.com/sule01u/CVE-2023-46604⭐ 35 🔗 6 · Exploit
- 🔥 https://github.com/trganda/ActiveMQ-RCE⭐ 28 🔗 8 · Exploit
- 🔥 https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell⭐ 16 🔗 5 · Exploit
- 🔥 https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit⭐ 17 🔗 3 · Exploit
- 🔥 https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp⭐ 5 · Exploit
- 🔥 https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up⭐ 3 · Exploit
- 🔥 https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26117 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13920 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-24-440 · Security Note