高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Apache Software Foundation | Apache ActiveMQ | 5.18.0 ~ 5.18.3 | - | |
| Apache Software Foundation | Apache ActiveMQ Legacy OpenWire Module | 5.18.0 ~ 5.18.3 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言 | https://github.com/X1r0z/ActiveMQ-RCE | POC詳細 |
| 2 | CVE-2023-46604 | https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max | POC詳細 |
| 3 | Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) | https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ | POC詳細 |
| 4 | None | https://github.com/evkl1d/CVE-2023-46604 | POC詳細 |
| 5 | CVE-2023-46604 ActiveMQ RCE vulnerability verification/exploitation tool | https://github.com/sule01u/CVE-2023-46604 | POC詳細 |
| 6 | CVE-2023-46604 Apache ActiveMQ RCE exp 基于python | https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp | POC詳細 |
| 7 | None | https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up | POC詳細 |
| 8 | This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol. | https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell | POC詳細 |
| 9 | POC repo for CVE-2023-46604 | https://github.com/vjayant93/CVE-2023-46604-POC | POC詳細 |
| 10 | CVE-2023-46604环境复现包 | https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence | POC詳細 |
| 11 | None | https://github.com/NKeshawarz/CVE-2023-46604-RCE | POC詳細 |
| 12 | PY | https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604 | POC詳細 |
| 13 | None | https://github.com/nitzanoligo/CVE-2023-46604-demo | POC詳細 |
| 14 | Repository to exploit CVE-2023-46604 reported for ActiveMQ | https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604 | POC詳細 |
| 15 | CVE-2023-46604 | https://github.com/trganda/ActiveMQ-RCE | POC詳細 |
| 16 | Exploit for CVE-2023-46604 | https://github.com/mrpentst/CVE-2023-46604 | POC詳細 |
| 17 | None | https://github.com/dcm2406/CVE-2023-46604 | POC詳細 |
| 18 | CVE-2023-46604 - ApacheMQ Version 5.15.5 Vulnerability Machine: Broker | https://github.com/Mudoleto/Broker_ApacheMQ | POC詳細 |
| 19 | None | https://github.com/hh-hunter/cve-2023-46604 | POC詳細 |
| 20 | None | https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604 | POC詳細 |
| 21 | ActiveMQ RCE (CVE-2023-46604) 回显利用工具 | https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit | POC詳細 |
| 22 | None | https://github.com/ph-hitachi/CVE-2023-46604 | POC詳細 |
| 23 | A go-exploit for Apache ActiveMQ CVE-2023-46604 | https://github.com/vulncheck-oss/cve-2023-46604 | POC詳細 |
| 24 | activemq-rce-cve-2023-46604 | https://github.com/thinkycx/activemq-rce-cve-2023-46604 | POC詳細 |
| 25 | CVE-2023-46604 (Apache ActiveMQ RCE Vulnerability) and focused on getting Indicators of Compromise. | https://github.com/mranv/honeypot.rs | POC詳細 |
| 26 | El script explota una vulnerabilidad de deserialización insegura en Apache ActiveMQ (CVE-2023-46604) | https://github.com/pulentoski/CVE-2023-46604 | POC詳細 |
| 27 | None | https://github.com/stegano5/ExploitScript-CVE-2023-46604 | POC詳細 |
| 28 | None | https://github.com/cuanh2333/CVE-2023-46604 | POC詳細 |
| 29 | Repository to exploit CVE-2023-46604 reported for ActiveMQ | https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate | POC詳細 |
| 30 | Repository to exploit CVE-2023-46604 reported for ActiveMQ | https://github.com/tomasmussi/activemq-cve-2023-46604 | POC詳細 |
| 31 | None | https://github.com/skrkcb2/CVE-2023-46604 | POC詳細 |
| 32 | Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath. Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2023/CVE-2023-46604.yaml | POC詳細 |
| 33 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-46604.md | POC詳細 |
| 34 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20OpenWire%20%E5%8D%8F%E8%AE%AE%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-46604.md | POC詳細 |
| 35 | https://github.com/vulhub/vulhub/blob/master/activemq/CVE-2023-46604/README.md | POC詳細 | |
| 36 | CVE-2023-46604 | https://github.com/ImuSpirit/ActiveMQ_RCE_Pro_Max | POC詳細 |
| 37 | None | https://github.com/CCIEVoice2009/CVE-2023-46604 | POC詳細 |
| 38 | Vulnerability Detection and Mitigation Apache ActiveMQ | Security Architectures and Systems Administration - on - Apache ActiveMQ Deserialization Remote Code Execution (RCE) – CVE-2023-46604 | https://github.com/vaishnavucv/Project-Vuln-Detection-N-Mitigation_101 | POC詳細 |
| 39 | Detection, Exploit and Mitigation for CVE 2023 46604. | https://github.com/pavanaa4k/CVE-2023-46604-LAB | POC詳細 |
| 40 | A PoC for CVE-2023-46604 written as part of SPS class for the Advanced Cyber Security master's at UPB. | https://github.com/RockyDesigne/SSP-Assignment-3-RCEYouLater | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成まだコメントはありません