The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath.Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
- http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2024/Apr/18
- https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/Abdibimantara/Outbound-Connection-OpenWire-Case-Cyberdefender
- https://github.com/Anekant-Singhai/Exploits
- https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit
- https://github.com/Awrrays/FrameVul
- https://github.com/CCIEVoice2009/CVE-2023-46604
- https://github.com/Catbamboo/Catbamboo.github.io
- https://github.com/Charlemagne-ai/aws-tpot-honeypot
- https://github.com/ImuSpirit/ActiveMQ_RCE_Pro_Max
- https://github.com/J1ezds/Vulnerability-Wiki-page
- https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max
- https://github.com/Jereanny14/jereanny14.github.io
- https://github.com/Linathimqalo/cloud-honeypot-analysis
- https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Mudoleto/Broker_ApacheMQ
- https://github.com/NKeshawarz/CVE-2023-46604-RCE
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604
- https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ
- https://github.com/T0ngMystic/Vulnerability_List
- https://github.com/TheOffender/dock-n-pwn
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/X1r0z/ActiveMQ-RCE
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/ZonghaoLi777/githubTrending
- https://github.com/afonsovitorio/cve_sandbox
- https://github.com/amnaamjid/IS-825-Vulnerability-Exploitation-Defence
- https://github.com/aneasystone/github-trending
- https://github.com/anqorithm/Saudi-CERT-API
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/cc8700619/poc
- https://github.com/cuanh2333/CVE-2023-46604
- https://github.com/cve-sandbox-bot/cve_sandbox
- https://github.com/dcm2406/CVE-2023-46604
- https://github.com/dcm2406/CVE-Lab
- https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell
- https://github.com/erickrr-bd/PoC-CVE
- https://github.com/evkl1d/CVE-2023-46604
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks
- https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up
- https://github.com/hackyou1432/brokerfile.php
- https://github.com/hdgokani/Golangexploit
- https://github.com/hungnqdz/cve
- https://github.com/infokek/activemq-honeypot
- https://github.com/johe123qwe/github-trending
- https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp
- https://github.com/k8gege/Ladon
- https://github.com/kezibei/ActiveMQExp
- https://github.com/linuskoester/writeups
- https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604
- https://github.com/mranv/blogs
- https://github.com/mranv/honeypot.rs
- https://github.com/mrpentst/CVE-2023-46604
- https://github.com/muneebaashiq/MBProjects
- https://github.com/myonggyu/whs
- https://github.com/nitzanoligo/CVE-2023-46604-demo
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ph-hitachi/CVE-2023-46604
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/pulentoski/CVE-2023-46604
- https://github.com/sampsonv/github-trending
- https://github.com/seal-community/patches
- https://github.com/silentEAG/awesome-stars
- https://github.com/skrkcb2/CVE-2023-46604
- https://github.com/skrkcb2/Secure
- https://github.com/stegano5/ExploitScript-CVE-2023-46604
- https://github.com/sule01u/CVE-2023-46604
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tanjiti/sec_profile
- https://github.com/thinkycx/activemq-rce-cve-2023-46604
- https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604
- https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate
- https://github.com/tomasmussi/activemq-cve-2023-46604
- https://github.com/trganda/ActiveMQ-RCE
- https://github.com/vaishnavucv/Project-Vuln-Detection-N-Mitigation_101
- https://github.com/venkycs/cy8
- https://github.com/vjayant93/CVE-2023-46604-POC
- https://github.com/vulncheck-oss/cve-2023-46604
- https://github.com/vulncheck-oss/go-exploit
- https://github.com/whitfieldsdad/cisa_kev
- https://github.com/zaveribrijesh/cve_sandbox
- https://github.com/zengzzzzz/golang-trending-archive