CVE-2023-33246

CRITICAL KEV NUCLEI

Apache RocketMQ update config RCE

Title source: metasploit

Description

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

Exploits (16)

nomisec WORKING POC 112 stars
by SuperZero · poc
https://github.com/SuperZero/CVE-2023-33246
nomisec WORKING POC 104 stars
by Malayke · remote
https://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT
nomisec WORKING POC 82 stars
by Le1a · poc
https://github.com/Le1a/CVE-2023-33246
nomisec WORKING POC 62 stars
by I5N0rth · remote
https://github.com/I5N0rth/CVE-2023-33246
nomisec SCANNER 5 stars
by vulncheck-oss · remote
https://github.com/vulncheck-oss/fetch-broker-conf
nomisec SCANNER 3 stars
by P4x1s · poc
https://github.com/P4x1s/CVE-2023-33246
nomisec WRITEUP 2 stars
by 4mazing · poc
https://github.com/4mazing/CVE-2023-33246-Copy
nomisec SCANNER 2 stars
by 0xKayala · poc
https://github.com/0xKayala/CVE-2023-33246
nomisec WORKING POC 1 stars
by MkJos · poc
https://github.com/MkJos/CVE-2023-33246_RocketMQ_RCE_EXP
nomisec WORKING POC 1 stars
by d0rb · remote
https://github.com/d0rb/CVE-2023-33246
nomisec WRITEUP 1 stars
by PavilionQ · poc
https://github.com/PavilionQ/CVE-2023-33246-mitigation
nomisec WORKING POC
by Sumitpathania03 · remote
https://github.com/Sumitpathania03/Apache-RocketMQ-CVE-2023-33246-
nomisec WRITEUP
by shoucheng3 · poc
https://github.com/shoucheng3/apache__rocketmq_CVE-2023-33246_5-1-0
metasploit SCANNER
by h00die, Malayke · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/misc/rocketmq_version.rb
metasploit WORKING POC EXCELLENT
by Malayke, jheysel-r7, h00die · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_rocketmq_update_config.rb

Nuclei Templates (1)

RocketMQ <= 5.1.0 - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: title:"RocketMQ" || http.title:"rocketmq-console-ng" || http.title:"rocketmq"
FOFA: protocol="rocketmq" || title="rocketmq-console-ng" || title="rocketmq"

Scores

CVSS v3 9.8
EPSS 0.9439
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2023-09-06
VulnCheck KEV 2023-08-28
InTheWild.io 2023-08-28
ENISA EUVD EUVD-2023-2175

Classification

CWE
CWE-94
Status published

Affected Products (4)

apache/rocketmq < 4.9.6
org.apache.rocketmq/rocketmq-broker < 5.1.1Maven
org.apache.rocketmq/rocketmq-namesrv < 4.9.6Maven
org.apache.rocketmq/rocketmq-controller < 5.1.1Maven

Timeline

Published May 24, 2023
KEV Added Sep 06, 2023
Tracked Since Feb 18, 2026