PT-2023-6605 · Apache +3 · Apache Activemq +3
Yejie@Threatbook.Cn
·
Published
2023-10-27
·
Updated
2025-08-31
·
CVE-2023-46604
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Apache ActiveMQ versions prior to 5.15.16, prior to 5.16.7, prior to 5.17.6, and prior to 5.18.3.
**Description:**
Apache ActiveMQ is vulnerable to Remote Code Execution (RCE) due to insecure deserialization of data within the OpenWire protocol. Successful exploitation allows a remote, unauthenticated attacker to execute arbitrary code on the server. Public exploits exist, and real-world exploitation has been observed, including instances involving the deployment of malware such as HelloKitty ransomware, Kinsing, and the Tsunami botnet. Attackers have been observed patching the vulnerability post-exploitation to maintain persistence and evade detection.
**Recommendations:**
Upgrade to version 5.15.16 or later.
Upgrade to version 5.16.7 or later.
Upgrade to version 5.17.6 or later.
Upgrade to version 5.18.3 or later.
Exploit
Fix
RCE
Deserialization of Untrusted Data
Weakness Enumeration
Related Identifiers
Affected Products
References · 361
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/apache_activemq_rce_cve_2023_46604.rb⭐ 35285 🔗 14255 · Exploit
- 🔥 https://github.com/X1r0z/ActiveMQ-RCE⭐ 239 🔗 30 · Exploit
- 🔥 https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ⭐ 114 🔗 39 · Exploit
- 🔥 https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max⭐ 62 🔗 3 · Exploit
- 🔥 https://github.com/sule01u/CVE-2023-46604⭐ 35 🔗 6 · Exploit
- 🔥 https://github.com/evkl1d/CVE-2023-46604⭐ 30 🔗 11 · Exploit
- 🔥 https://github.com/trganda/ActiveMQ-RCE⭐ 28 🔗 8 · Exploit
- 🔥 https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell⭐ 16 🔗 5 · Exploit
- 🔥 https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit⭐ 17 🔗 3 · Exploit
- 🔥 https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp⭐ 5 · Exploit
- 🔥 https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up⭐ 3 · Exploit
- 🔥 https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html · Exploit
- https://ubuntu.com/security/CVE-2020-13920 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/703867 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13920 · Security Note