Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache RocketMQ | 5.0.0 ~ 5.1.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Apache RocketMQ Arbitrary File Write Vulnerability Exploit | https://github.com/Malayke/CVE-2023-37582_EXPLOIT | POC Details |
| 2 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20RocketMQ%20NameServer%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2023-37582.md | POC Details |
| 3 | https://github.com/vulhub/vulhub/blob/master/rocketmq/CVE-2023-37582/README.md | POC Details | |
| 4 | None | https://github.com/laishouchao/Apache-RocketMQ-RCE-CVE-2023-37582-poc | POC Details |
| 5 | None | https://github.com/shoucheng3/apache__rocketmq_CVE-2023-37582_4-9-6 | POC Details |
| 6 | The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2023/CVE-2023-37582.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-30429 | 9.6 CRITICAL | Apache Pulsar: Incorrect Authorization for Function Worker when using mTLS Authentication |
| CVE-2023-37579 | 8.2 HIGH | Apache Pulsar Function Worker: Incorrect Authorization for Function Worker Can Leak Sink/S |
| CVE-2023-30428 | 8.2 HIGH | Apache Pulsar Broker: Incorrect Authorization Validation for Rest Producer |
| CVE-2022-42009 | 8.0 HIGH | Apache Ambari: A malicious authenticated user can remotely execute arbitrary code in the c |
| CVE-2022-45855 | 8.0 HIGH | Apache Ambari: Allows authenticated metrics consumers to perform RCE |
| CVE-2023-31007 | Apache Pulsar: Broker does not always disconnect client when authentication data expires | |
| CVE-2023-32200 | Apache Jena: Exposure of execution in script engine expressions. | |
| CVE-2023-35908 | Apache Airflow: Access to DAGs without relevant permission | |
| CVE-2023-22887 | Apache Airflow path traversal by authenticated user | |
| CVE-2022-46651 | Apache Airflow: Security vulnerability on AirFlow Connections | |
| CVE-2023-36543 | Apache Airflow: ReDoS via dags function | |
| CVE-2023-22888 | Apache Airflow: Scheduler remote DoS |
No comments yet