尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Apache Software Foundation | Apache ActiveMQ Broker | 0 ~ 5.19.6 | - | |
| Apache Software Foundation | Apache ActiveMQ All | 0 ~ 5.19.6 | - | |
| Apache Software Foundation | Apache ActiveMQ | 0 ~ 5.19.6 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Apache ActiveMQ before 5.19.6 and 6.0.0 through 6.2.4 is vulnerable to remote code execution via a bypass of the CVE-2026-34197 security fix. The original fix blocked the "vm://" transport scheme in BrokerView.addNetworkConnector() and BrokerView.addConnector() to prevent authenticated attackers from loading malicious Spring XML configurations via the Jolokia API. However, the fix only denied the "vm" scheme. An attacker can bypass this restriction by using the HTTP Discovery transport(http://attacker/discovery), which is not in the denied scheme list. The attacker-controlled HTTP endpoint returns a vm:// transport URI as a second-stage response, which then loads a remote Spring XML application context, leading to arbitrary code execution on the broker JVM. The activemq-http module must be on the classpath (present by default in the "all" distribution), and authenticated access to the Jolokia API (/api/jolokia/) is required. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-40466.yaml | POC详情 |
未找到公开 POC。
登录以生成 AI POC| CVE-2026-41043 | Apache ActiveMQ和Apache ActiveMQ Web 跨站脚本漏洞 | |
| CVE-2026-41044 | Apache多款产品 输入验证错误漏洞 | |
| CVE-2025-62233 | Apache DolphinScheduler 代码问题漏洞 | |
| CVE-2026-23902 | Apache DolphinScheduler 安全漏洞 | |
| CVE-2026-40690 | Apache Airflow 安全漏洞 | |
| CVE-2026-38743 | Apache Airflow 安全漏洞 |
暂无评论