Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2016-3088

Description

The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.

POC

Reference

- https://www.exploit-db.com/exploits/42283/

Github

- https://github.com/0ps/pocassistdb

- https://github.com/1120362990/vulnerability-list

- https://github.com/20142995/nuclei-templates

- https://github.com/20142995/pocsuite3

- https://github.com/422926799/haq5201314

- https://github.com/4ra1n/poc-runner

- https://github.com/6point6/vulnerable-docker-launcher

- https://github.com/7hang/cyber-security-interview

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/Accenture/vulnerable-docker-launcher

- https://github.com/Awrrays/FrameVul

- https://github.com/EvilAnne/Python_Learn

- https://github.com/ExpLife0011/awesome-windows-kernel-security-development

- https://github.com/HeArtE4t3r/CVE-2016-3088

- https://github.com/HimmelAward/Goby_POC

- https://github.com/Kaizhe/attacker

- https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088

- https://github.com/MelanyRoob/Goby

- https://github.com/MoeTaher/Broker_Writeup

- https://github.com/NCSU-DANCE-Research-Group/CDL

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/Ondrik8/exploit

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Threekiii/Vulhub-Reproduce

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/YutuSec/ActiveMQ_Crack

- https://github.com/Z0fhack/Goby_POC

- https://github.com/ZTK-009/Aggressor

- https://github.com/ZTK-009/Ladon

- https://github.com/ZTK-009/PowerLadon

- https://github.com/bakery312/Vulhub-Reproduce

- https://github.com/bigblackhat/oFx

- https://github.com/cc8700619/poc

- https://github.com/cl4ym0re/CVE-2016-3088

- https://github.com/cyberaguiar/CVE-2016-3088

- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks

- https://github.com/gobysec/Goby

- https://github.com/hktalent/bug-bounty

- https://github.com/itscio/Aggressor

- https://github.com/jiushill/haq5201314

- https://github.com/jweny/pocassistdb

- https://github.com/k8gege/Aggressor

- https://github.com/k8gege/Ladon

- https://github.com/k8gege/PowerLadon

- https://github.com/lnick2023/nicenice

- https://github.com/n0-traces/cve_monitor

- https://github.com/openx-org/BLEN

- https://github.com/pravinsrc/NOTES-windows-kernel-links

- https://github.com/pudiding/CVE-2016-3088

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/qiuluo-oss/Tiger

- https://github.com/ranhn/Goby-Poc

- https://github.com/retr0-13/Goby

- https://github.com/sponkmonk/Ladon_english_update

- https://github.com/t0m4too/t0m4to

- https://github.com/vonderchild/CVE-2016-3088

- https://github.com/xbfding/XiaoBai_exploit

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/yichensec/Bug_writer

- https://github.com/yuag/bgscan