// For flags

CVE-2023-46604

Apache ActiveMQ Deserialization of Untrusted Data Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

30
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

Apache ActiveMQ es vulnerable a la ejecución remota de código. La vulnerabilidad puede permitir que un atacante remoto con acceso a la red de un corredor ejecute comandos de shell arbitrarios manipulando tipos de clases serializadas en el protocolo OpenWire para hacer que el corredor cree una instancia de cualquier clase en el classpath. Se recomienda a los usuarios actualizar a la versión 5.15.16, 5.16.7, 5.17.6 o 5.18.3, que soluciona este problema.

A flaw was found in Apache ActiveMQ, specifically the OpenWire Module. This flaw may allow a remote malicious user to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol, causing the broker to instantiate any class on the classpath. This issue happens when OpenWire commands are unmarshalled, without validating the provided throwable class type, which could allow an attacker to jeopardize the entire server.

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics InfraSuite Device Master. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Apache ActiveMQ broker, which listens on TCP port 61616 by default. The issue results from the use of a vulnerable version of Apache ActiveMQ. An attacker can leverage this vulnerability to execute code in the context of the service account.

Chess Hazlett discovered that Apache ActiveMQ incorrectly handled certain commands. A remote attacker could possibly use this issue to terminate the program, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS. Peter Stoeckli discovered that Apache ActiveMQ incorrectly handled hostname verification. A remote attacker could possibly use this issue to perform a person-in-the-middle attack. This issue only affected Ubuntu 16.04 LTS.

Apache ActiveMQ contains a deserialization of untrusted data vulnerability that may allow a remote attacker with network access to a broker to run shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.

*Credits: yejie@threatbook.cn
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-10-24 CVE Reserved
  • 2023-10-27 CVE Published
  • 2023-11-02 Exploited in Wild
  • 2023-11-03 First Exploit
  • 2023-11-23 KEV Due Date
  • 2025-02-13 CVE Updated
  • 2025-03-24 EPSS Updated
CWE
  • CWE-502: Deserialization of Untrusted Data
CAPEC
References (39)
URL Date SRC
https://packetstorm.news/files/id/175676 2023-11-14
https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ 2023-11-03
https://github.com/sule01u/CVE-2023-46604 2023-11-12
https://github.com/mrpentst/CVE-2023-46604 2024-02-24
https://github.com/ST3G4N05/ExploitScript-CVE-2023-46604 2024-02-14
https://github.com/evkl1d/CVE-2023-46604 2023-11-04
https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell 2024-01-24
https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp 2023-11-08
https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up 2023-11-09
https://github.com/nitzanoligo/CVE-2023-46604-demo 2023-11-20
https://github.com/NKeshawarz/CVE-2023-46604-RCE 2023-11-18
https://github.com/dcm2406/CVE-2023-46604 2023-12-21
https://github.com/pulentoski/CVE-2023-46604 2024-05-31
https://github.com/vjayant93/CVE-2023-46604-POC 2023-11-16
https://github.com/stegano5/ExploitScript-CVE-2023-46604 2024-02-14
https://github.com/trganda/ActiveMQ-RCE 2024-05-16
https://github.com/X1r0z/ActiveMQ-RCE 2024-11-22
https://github.com/JaneMandy/ActiveMQ_RCE_Pro_Max 2024-11-09
https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence 2024-01-24
https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604 2023-11-21
https://github.com/tomasmussi-mulesoft/activemq-cve-2023-46604 2024-11-02
https://github.com/Mudoleto/Broker_ApacheMQ 2023-12-26
https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit 2024-11-01
https://github.com/vulncheck-oss/cve-2023-46604 2024-10-30
https://github.com/thinkycx/activemq-rce-cve-2023-46604 2024-04-26
https://github.com/mranv/honeypot.rs 2024-05-29
https://github.com/cuanh2333/CVE-2023-46604 2024-10-22
https://github.com/tomasmussi/activemq-cve-2023-46604 2025-01-21
https://github.com/skrkcb2/CVE-2023-46604 2025-02-27
https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html 2025-02-13
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Activemq
Search vendor "Apache" for product "Activemq"
< 5.15.16
Search vendor "Apache" for product "Activemq" and version " < 5.15.16"
-
Affected
Apache
Search vendor "Apache"
Activemq
Search vendor "Apache" for product "Activemq"
>= 5.16.0 < 5.16.7
Search vendor "Apache" for product "Activemq" and version " >= 5.16.0 < 5.16.7"
-
Affected
Apache
Search vendor "Apache"
Activemq
Search vendor "Apache" for product "Activemq"
>= 5.17.0 < 5.17.6
Search vendor "Apache" for product "Activemq" and version " >= 5.17.0 < 5.17.6"
-
Affected
Apache
Search vendor "Apache"
Activemq
Search vendor "Apache" for product "Activemq"
>= 5.18.0 < 5.18.3
Search vendor "Apache" for product "Activemq" and version " >= 5.18.0 < 5.18.3"
-
Affected
Apache
Search vendor "Apache"
Activemq Legacy Openwire Module
Search vendor "Apache" for product "Activemq Legacy Openwire Module"
< 5.15.16
Search vendor "Apache" for product "Activemq Legacy Openwire Module" and version " < 5.15.16"
-
Affected
Apache
Search vendor "Apache"
Activemq Legacy Openwire Module
Search vendor "Apache" for product "Activemq Legacy Openwire Module"
>= 5.16.0 < 5.16.7
Search vendor "Apache" for product "Activemq Legacy Openwire Module" and version " >= 5.16.0 < 5.16.7"
-
Affected
Apache
Search vendor "Apache"
Activemq Legacy Openwire Module
Search vendor "Apache" for product "Activemq Legacy Openwire Module"
>= 5.17.0 < 5.17.6
Search vendor "Apache" for product "Activemq Legacy Openwire Module" and version " >= 5.17.0 < 5.17.6"
-
Affected
Apache
Search vendor "Apache"
Activemq Legacy Openwire Module
Search vendor "Apache" for product "Activemq Legacy Openwire Module"
>= 5.18.0 < 5.18.3
Search vendor "Apache" for product "Activemq Legacy Openwire Module" and version " >= 5.18.0 < 5.18.3"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Unified Manager
Search vendor "Netapp" for product "E-series Santricity Unified Manager"
--
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Web Services Proxy
Search vendor "Netapp" for product "E-series Santricity Web Services Proxy"
--
Affected
Netapp
Search vendor "Netapp"
Santricity Storage Plugin
Search vendor "Netapp" for product "Santricity Storage Plugin"
-vcenter
Affected