CVE-2016-3088

CRITICAL KEV RANSOMWARE NUCLEI

ActiveMQ web shell upload

Title source: metasploit

Description

The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.

Exploits (10)

nomisec WORKING POC 19 stars
by YutuSec · poc
https://github.com/YutuSec/ActiveMQ_Crack
nomisec WORKING POC 15 stars
by Ma1Dong · remote
https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088
nomisec WORKING POC 5 stars
by cyberaguiar · remote-auth
https://github.com/cyberaguiar/CVE-2016-3088
nomisec WORKING POC 4 stars
by cl4ym0re · remote-auth
https://github.com/cl4ym0re/CVE-2016-3088
nomisec WORKING POC
by vonderchild · remote-auth
https://github.com/vonderchild/CVE-2016-3088
nomisec WORKING POC
by pudiding · remote-auth
https://github.com/pudiding/CVE-2016-3088
nomisec WORKING POC
by HeArtE4t3r · remote
https://github.com/HeArtE4t3r/CVE-2016-3088
metasploit WORKING POC EXCELLENT
rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_activemq_upload_jsp.rb
exploitdb WORKING POC VERIFIED
by David Jorm · textremotewindows
https://www.exploit-db.com/exploits/40857
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/42283

Nuclei Templates (1)

Apache ActiveMQ Fileserver - Arbitrary File Write
CRITICALby fq_hsu
Shodan: cpe:"cpe:2.3:a:apache:activemq" || product:"activemq openwire transport"

Scores

CVSS v3 9.8
EPSS 0.9429
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-02-10
VulnCheck KEV 2018-09-19
InTheWild.io 2022-02-10
ENISA EUVD EUVD-2022-5255
Ransomware Use Confirmed

Classification

CWE
CWE-434
Status draft

Affected Products (2)

apache/activemq < 5.14.0
org.apache.activemq/activemq-client < 5.14.0Maven

Timeline

Published Jun 01, 2016
KEV Added Feb 10, 2022
Tracked Since Feb 18, 2026