Skip to main content

CVE-2023-33246

Description

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. 

Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. 

To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

NVD
Severity: CRITICAL
CVE ID: CVE-2023-33246
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Refrence: NVDMITRE

Proof Of Concept

I5N0rth

Refrence: GitHub

yizhimanpadewoniu

Refrence: GitHub

Le1a

Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit

Refrence: GitHub

SuperZero

Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit

Refrence: GitHub

Malayke

CVE-2023-33246 RocketMQ RCE Detect By Version and Exploit

Refrence: GitHub

CKevens

CVE-2023-33246:Apache RocketMQ 远程命令执行漏洞检测工具

Refrence: GitHub

Devil0ll

CVE-2023-33246

Refrence: GitHub

d0rb

CVE-2023-33246 POC

Refrence: GitHub

vulncheck-oss

A go-exploit for fetching the RocketMQ broker configuration in order to discover indicators of compromise for CVE-2023-33246

Refrence: GitHub

0xKayala

CVE-2023-33246 - Apache RocketMQ config RCE

Refrence: GitHub

MkJos

Refrence: GitHub

hanch7274

Refrence: GitHub