Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache ActiveMQ | 5.18.0 ~ 5.18.3 | - | |
| Apache Software Foundation | Apache ActiveMQ Legacy OpenWire Module | 5.18.0 ~ 5.18.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言 | https://github.com/X1r0z/ActiveMQ-RCE | POC Details |
| 2 | CVE-2023-46604 | https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max | POC Details |
| 3 | Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) | https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ | POC Details |
| 4 | None | https://github.com/evkl1d/CVE-2023-46604 | POC Details |
| 5 | CVE-2023-46604 ActiveMQ RCE vulnerability verification/exploitation tool | https://github.com/sule01u/CVE-2023-46604 | POC Details |
| 6 | CVE-2023-46604 Apache ActiveMQ RCE exp 基于python | https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp | POC Details |
| 7 | None | https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up | POC Details |
| 8 | This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due to unsafe deserialization within the OpenWire protocol. | https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell | POC Details |
| 9 | POC repo for CVE-2023-46604 | https://github.com/vjayant93/CVE-2023-46604-POC | POC Details |
| 10 | CVE-2023-46604环境复现包 | https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence | POC Details |
| 11 | None | https://github.com/NKeshawarz/CVE-2023-46604-RCE | POC Details |
| 12 | PY | https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604 | POC Details |
| 13 | None | https://github.com/nitzanoligo/CVE-2023-46604-demo | POC Details |
| 14 | Repository to exploit CVE-2023-46604 reported for ActiveMQ | https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604 | POC Details |
| 15 | CVE-2023-46604 | https://github.com/trganda/ActiveMQ-RCE | POC Details |
| 16 | Exploit for CVE-2023-46604 | https://github.com/mrpentst/CVE-2023-46604 | POC Details |
| 17 | None | https://github.com/dcm2406/CVE-2023-46604 | POC Details |
| 18 | CVE-2023-46604 - ApacheMQ Version 5.15.5 Vulnerability Machine: Broker | https://github.com/Mudoleto/Broker_ApacheMQ | POC Details |
| 19 | None | https://github.com/hh-hunter/cve-2023-46604 | POC Details |
| 20 | None | https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604 | POC Details |
| 21 | ActiveMQ RCE (CVE-2023-46604) 回显利用工具 | https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit | POC Details |
| 22 | None | https://github.com/ph-hitachi/CVE-2023-46604 | POC Details |
| 23 | A go-exploit for Apache ActiveMQ CVE-2023-46604 | https://github.com/vulncheck-oss/cve-2023-46604 | POC Details |
| 24 | activemq-rce-cve-2023-46604 | https://github.com/thinkycx/activemq-rce-cve-2023-46604 | POC Details |
| 25 | CVE-2023-46604 (Apache ActiveMQ RCE Vulnerability) and focused on getting Indicators of Compromise. | https://github.com/mranv/honeypot.rs | POC Details |
| 26 | El script explota una vulnerabilidad de deserialización insegura en Apache ActiveMQ (CVE-2023-46604) | https://github.com/pulentoski/CVE-2023-46604 | POC Details |
| 27 | None | https://github.com/stegano5/ExploitScript-CVE-2023-46604 | POC Details |
| 28 | None | https://github.com/cuanh2333/CVE-2023-46604 | POC Details |
| 29 | Repository to exploit CVE-2023-46604 reported for ActiveMQ | https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604-duplicate | POC Details |
| 30 | Repository to exploit CVE-2023-46604 reported for ActiveMQ | https://github.com/tomasmussi/activemq-cve-2023-46604 | POC Details |
| 31 | None | https://github.com/skrkcb2/CVE-2023-46604 | POC Details |
| 32 | Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath. Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2023/CVE-2023-46604.yaml | POC Details |
| 33 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-46604.md | POC Details |
| 34 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20OpenWire%20%E5%8D%8F%E8%AE%AE%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-46604.md | POC Details |
| 35 | https://github.com/vulhub/vulhub/blob/master/activemq/CVE-2023-46604/README.md | POC Details | |
| 36 | CVE-2023-46604 | https://github.com/ImuSpirit/ActiveMQ_RCE_Pro_Max | POC Details |
| 37 | None | https://github.com/CCIEVoice2009/CVE-2023-46604 | POC Details |
| 38 | Vulnerability Detection and Mitigation Apache ActiveMQ | Security Architectures and Systems Administration - on - Apache ActiveMQ Deserialization Remote Code Execution (RCE) – CVE-2023-46604 | https://github.com/vaishnavucv/Project-Vuln-Detection-N-Mitigation_101 | POC Details |
| 39 | Detection, Exploit and Mitigation for CVE 2023 46604. | https://github.com/pavanaa4k/CVE-2023-46604-LAB | POC Details |
| 40 | A PoC for CVE-2023-46604 written as part of SPS class for the Advanced Cyber Security master's at UPB. | https://github.com/RockyDesigne/SSP-Assignment-3-RCEYouLater | POC Details |
No public POC found.
Login to generate AI POCNo comments yet