CVE-2016-3088
CRITICAL KEV RANSOMWARE NUCLEIActiveMQ web shell upload
Title source: metasploitDescription
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.
Exploits (10)
nomisec
WORKING POC
15 stars
by Ma1Dong · remote
https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088
nomisec
WORKING POC
5 stars
by cyberaguiar · remote-auth
https://github.com/cyberaguiar/CVE-2016-3088
metasploit
WORKING POC
EXCELLENT
rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_activemq_upload_jsp.rb
exploitdb
WORKING POC
VERIFIED
by David Jorm · textremotewindows
https://www.exploit-db.com/exploits/40857
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/42283
Nuclei Templates (1)
Apache ActiveMQ Fileserver - Arbitrary File Write
CRITICALby fq_hsu
Shodan:
cpe:"cpe:2.3:a:apache:activemq" || product:"activemq openwire transport"
Scores
CVSS v3
9.8
EPSS
0.9429
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2022-02-10
VulnCheck KEV
2018-09-19
InTheWild.io
2022-02-10
ENISA EUVD
EUVD-2022-5255
Ransomware Use
Confirmed
Classification
CWE
CWE-434
Status
draft
Affected Products (2)
apache/activemq
< 5.14.0
org.apache.activemq/activemq-client
< 5.14.0Maven
Timeline
Published
Jun 01, 2016
KEV Added
Feb 10, 2022
Tracked Since
Feb 18, 2026