CVE-2023-33246
CRITICAL KEV NUCLEIApache RocketMQ update config RCE
Title source: metasploitDescription
For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content. To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .
Exploits (16)
nomisec
WORKING POC
104 stars
by Malayke · remote
https://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT
nomisec
SCANNER
5 stars
by vulncheck-oss · remote
https://github.com/vulncheck-oss/fetch-broker-conf
nomisec
WORKING POC
by Sumitpathania03 · remote
https://github.com/Sumitpathania03/Apache-RocketMQ-CVE-2023-33246-
nomisec
WRITEUP
by shoucheng3 · poc
https://github.com/shoucheng3/apache__rocketmq_CVE-2023-33246_5-1-0
metasploit
SCANNER
by h00die, Malayke · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/misc/rocketmq_version.rb
metasploit
WORKING POC
EXCELLENT
by Malayke, jheysel-r7, h00die · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_rocketmq_update_config.rb
Nuclei Templates (1)
RocketMQ <= 5.1.0 - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
title:"RocketMQ" || http.title:"rocketmq-console-ng" || http.title:"rocketmq"
FOFA:
protocol="rocketmq" || title="rocketmq-console-ng" || title="rocketmq"
References (7)
Scores
CVSS v3
9.8
EPSS
0.9439
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2023-09-06
VulnCheck KEV
2023-08-28
InTheWild.io
2023-08-28
ENISA EUVD
EUVD-2023-2175
Classification
CWE
CWE-94
Status
published
Affected Products (4)
apache/rocketmq
< 4.9.6
org.apache.rocketmq/rocketmq-broker
< 5.1.1Maven
org.apache.rocketmq/rocketmq-namesrv
< 4.9.6Maven
org.apache.rocketmq/rocketmq-controller
< 5.1.1Maven
Timeline
Published
May 24, 2023
KEV Added
Sep 06, 2023
Tracked Since
Feb 18, 2026