nomisec
WORKING POC
123 stars
by SaumyajeetDas · remote
https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ
This repository contains a functional exploit for CVE-2023-46604, targeting Apache ActiveMQ via deserialization to achieve remote code execution (RCE). The exploit sends a crafted payload to trigger the vulnerability and can be used to generate reverse shells for both Linux and Windows targets.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (versions affected by CVE-2023-46604)
No auth needed
Prerequisites:
Network access to the target ActiveMQ server · Ability to host malicious XML files on an accessible server · Metasploit Framework for payload generation
nomisec
WORKING POC
63 stars
by ImuSpirit · poc
https://github.com/ImuSpirit/ActiveMQ_RCE_Pro_Max
This repository contains a functional GUI-based exploit for CVE-2023-46604, targeting Apache ActiveMQ. The exploit leverages deserialization via a crafted `ClassPathXmlApplicationContext` payload to achieve remote code execution (RCE).
Classification
Working Poc 90%
Target:
Apache ActiveMQ (versions <= 5.18.2)
Auth required
Prerequisites:
Network access to the target ActiveMQ instance · Valid credentials (default 'admin:admin') · Target running a vulnerable version of ActiveMQ
nomisec
WORKING POC
40 stars
by Arlenhiack · remote
https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit
This repository contains a functional exploit for CVE-2023-46604, targeting Apache ActiveMQ versions below 5.18.3. The exploit leverages a deserialization vulnerability to achieve remote code execution (RCE) by crafting a malicious XML payload that defines a malicious class and executes arbitrary commands.
Classification
Working Poc 95%
Target:
Apache ActiveMQ < 5.18.3
No auth needed
Prerequisites:
Target must be running a vulnerable version of Apache ActiveMQ · Network access to the target
nomisec
WORKING POC
39 stars
by evkl1d · remote
https://github.com/evkl1d/CVE-2023-46604
This repository contains a functional Python exploit for CVE-2023-46604, a deserialization vulnerability in Apache ActiveMQ's OpenWire protocol. The exploit crafts a malicious payload to trigger remote code execution by leveraging unsafe deserialization practices.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (versions affected by CVE-2023-46604)
No auth needed
Prerequisites:
Python 3.x · Network access to the vulnerable ActiveMQ server · URL to a malicious XML file accessible by the target
nomisec
WORKING POC
29 stars
by trganda · local
https://github.com/trganda/ActiveMQ-RCE
This repository contains a functional exploit for CVE-2023-46604, leveraging a deserialization vulnerability in Apache ActiveMQ. The exploit sends a malicious ExceptionResponse packet containing a crafted ClassPathXmlApplicationContext object, which triggers remote code execution via a Spring bean XML file hosted on an attacker-controlled server.
Classification
Working Poc 95%
Target:
Apache ActiveMQ versions < 5.18.3, < 5.17.6, < 5.16.7, < 5.15.16
Auth required
Prerequisites:
Access to a vulnerable ActiveMQ instance · Valid credentials for authentication · Ability to host a malicious XML file on an accessible HTTP server
nomisec
WORKING POC
18 stars
by duck-sec · remote
https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell
This repository contains a functional Python exploit for CVE-2023-46604, a deserialization vulnerability in Apache ActiveMQ's OpenWire protocol. The exploit generates a pseudo-shell by crafting malicious XML payloads and leveraging a local HTTP server to receive command output from the target.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (OpenWire protocol)
No auth needed
Prerequisites:
Python 3.x · Network access to vulnerable ActiveMQ server
nomisec
WORKING POC
5 stars
by justdoit-cai · remote
https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp
This repository contains a functional Python exploit for CVE-2023-46604, an RCE vulnerability in Apache ActiveMQ. The exploit crafts a malicious OpenWire protocol packet to trigger deserialization of a remote XML file, leading to arbitrary code execution.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (versions <= 5.18.3)
No auth needed
Prerequisites:
Network access to the target's OpenWire port (default 61616) · A reachable malicious XML file hosted by the attacker
nomisec
WORKING POC
4 stars
by vulncheck-oss · remote
https://github.com/vulncheck-oss/cve-2023-46604
This repository contains a functional Go-based exploit for CVE-2023-46604, targeting Apache ActiveMQ. The exploit validates the target, checks the version, and executes a reverse shell or downloads/executes a binary payload via a Nashorn payload.
Classification
Working Poc 95%
Target:
Apache ActiveMQ versions 5.15.0-5.15.15, 5.16.0-5.16.6, 5.17.0-5.17.5, and 5.18.0-5.18.2
No auth needed
Prerequisites:
Network access to the target's OpenWire port (default 61616) · Target must be running a vulnerable version of Apache ActiveMQ
nomisec
WORKING POC
2 stars
by RockyDesigne · poc
https://github.com/RockyDesigne/SSP-Assignment-3-RCEYouLater
This repository contains a fully functional exploit for CVE-2023-46604, leveraging deserialization of a malicious XML configuration file in Apache ActiveMQ to achieve remote code execution. The exploit includes a Dockerized vulnerable environment, a Python-based exploit script, and a malicious XML payload to demonstrate the vulnerability.
Classification
Working Poc 100%
Target:
Apache ActiveMQ 5.15.10
No auth needed
Prerequisites:
Docker and Docker Compose · Python 3 · Network access to the target ActiveMQ server
nomisec
WORKING POC
2 stars
by dcm2406 · poc
https://github.com/dcm2406/CVE-Lab
This repository contains a working proof-of-concept for CVE-2021-44228 (Log4Shell) and CVE-2023-46604 (Apache ActiveMQ RCE). It includes detailed setup instructions, exploit code, and steps to achieve remote code execution via LDAP/JNDI injection and reverse shell.
Classification
Working Poc 95%
Target:
Apache Log4j 2.x, Apache ActiveMQ 5.18.2
No auth needed
Prerequisites:
Kali Linux 2023.4 · Ubuntu 22.04.3 LTS · OpenJDK 8/18 · Docker · Network access to target
nomisec
WORKING POC
2 stars
by mrpentst · remote
https://github.com/mrpentst/CVE-2023-46604
This repository contains a functional exploit for CVE-2023-46604, a critical remote code execution vulnerability in Apache ActiveMQ. The exploit leverages insecure deserialization in the OpenWire protocol to execute arbitrary commands by manipulating serialized class types.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (OpenWire protocol)
No auth needed
Prerequisites:
Network access to the target ActiveMQ broker on port 61616 · A reachable URL hosting a malicious XML configuration file
nomisec
WORKING POC
2 stars
by NKeshawarz · remote
https://github.com/NKeshawarz/CVE-2023-46604-RCE
This repository contains a functional Python exploit for CVE-2023-46604, a deserialization vulnerability in Apache ActiveMQ's OpenWire transport unmarshaller. The exploit sends a crafted payload to trigger remote code execution by leveraging a malicious XML URL.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (versions 5.18.0-5.18.2, 5.17.0-5.17.5, 5.16.0-5.16.6, and before 5.15.16)
No auth needed
Prerequisites:
Hosted malicious XML file (POC.XML) · Network access to target ActiveMQ server on port 61616
nomisec
WORKING POC
2 stars
by LiritoShawshark · poc
https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence
This repository contains a functional exploit for CVE-2023-46604, targeting Apache ActiveMQ 5.15.15. The exploit leverages deserialization vulnerabilities in the broker and client truststore files to achieve remote code execution (RCE).
Classification
Working Poc 90%
Target:
Apache ActiveMQ 5.15.15
No auth needed
Prerequisites:
Network access to the target ActiveMQ instance · Vulnerable version of Apache ActiveMQ (5.15.15)
nomisec
WORKING POC
1 stars
by Catherines77 · poc
https://github.com/Catherines77/ActiveMQ-EXPtools
This repository contains a Java-based tool for detecting and exploiting multiple Apache ActiveMQ vulnerabilities, including CVE-2023-46604. It includes functional exploit code for deserialization attacks and webshell deployment, with a GUI interface for ease of use.
Classification
Working Poc 95%
Target:
Apache ActiveMQ
Auth required
Prerequisites:
target URL · authentication credentials for some exploits
nomisec
WRITEUP
1 stars
by vaishnavucv · poc
https://github.com/vaishnavucv/Project-Vuln-Detection-N-Mitigation_101
This repository provides a detailed academic analysis of CVE-2023-46604, focusing on vulnerability explanation, technical details, impact assessment, and mitigation strategies for Apache ActiveMQ deserialization RCE. It includes modular documentation but no functional exploit code.
Classification
Writeup 100%
Attack Type
Deserialization
Target:
Apache ActiveMQ Classic (versions up to 5.18.2)
No auth needed
Prerequisites:
Exposed ActiveMQ broker on default ports (e.g., 61616) · Network access to the vulnerable system
nomisec
WORKING POC
1 stars
by pulentoski · remote
https://github.com/pulentoski/CVE-2023-46604
This repository contains a functional Python exploit for CVE-2023-46604, which targets an unsafe deserialization vulnerability in Apache ActiveMQ's OpenWire protocol. The script crafts a malicious payload to trigger remote code execution by loading a Spring bean from a specified XML URL.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (versions affected by CVE-2023-46604)
No auth needed
Prerequisites:
Network access to the target ActiveMQ server · A malicious XML file hosted on an accessible URL
nomisec
WORKING POC
1 stars
by stegano5 · remote
https://github.com/stegano5/ExploitScript-CVE-2023-46604
This repository contains a functional Python exploit for CVE-2023-46604, targeting Apache ActiveMQ's OpenWire protocol. The exploit crafts a malicious packet to trigger deserialization of a Spring XML configuration file, leading to remote code execution.
Classification
Working Poc 90%
Target:
Apache ActiveMQ (OpenWire protocol)
No auth needed
Prerequisites:
Network access to target ActiveMQ server · URL hosting malicious Spring XML configuration file
github
WORKING POC
1 stars
by oscerd · pythonpoc
https://github.com/oscerd/nice-cve-poc/tree/main/CVE-2023-46604
The repository contains a functional PoC for CVE-2023-44487 (HTTP/2 Rapid Reset DoS) with a Python script that exploits the vulnerability by rapidly resetting HTTP/2 streams. It also references a Metasploit module for CVE-2023-46604 (Apache ActiveMQ RCE) but does not include the actual exploit code for the latter.
Classification
Working Poc 95%
Target:
HTTP/2 servers (e.g., Caddy, simplehttp2server, echoserver)
No auth needed
Prerequisites:
Python 3.x · hyper library · TLS-enabled HTTP/2 server
nomisec
WORKING POC
1 stars
by minhangxiaohui · remote
https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604
This repository contains a functional Python exploit for CVE-2023-46604, targeting Apache ActiveMQ. The exploit crafts a malicious payload to trigger deserialization via Spring gadgets (FileSystemXmlApplicationContext or ClassPathXmlApplicationContext) to achieve remote code execution.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Apache ActiveMQ (versions 5.18.3, 5.17.6, 5.16.7, 5.15.16 and below)
No auth needed
Prerequisites:
Network access to the target ActiveMQ instance · Target must be running a vulnerable version of ActiveMQ
nomisec
STUB
by jbogdanov · poc
https://github.com/jbogdanov/activemq-cve-playground
This repository is a Docker-based playground for CVE-2023-46604 (Apache ActiveMQ RCE) but lacks actual exploit implementation. The `attack.sh` and `verify.sh` scripts contain only placeholders (TODOs) with no functional exploit code.
Target:
Apache ActiveMQ 5.17.5
No auth needed
Prerequisites:
Docker · Docker Compose
nomisec
WRITEUP
by sangrok-jeon · poc
https://github.com/sangrok-jeon/CVE-2023-46604-Analysis
This repository provides a detailed technical analysis of CVE-2023-46604, an insecure deserialization vulnerability in Apache ActiveMQ. It includes root cause analysis, patch diffs, and a walkthrough of the exploit chain involving OpenWire deserialization and arbitrary class instantiation.
Classification
Writeup 100%
Attack Type
Deserialization
Target:
Apache ActiveMQ 5.15.x-5.18.x
No auth needed
Prerequisites:
Network access to OpenWire port (61616/TCP) · Vulnerable version of Apache ActiveMQ
nomisec
WRITEUP
by pavanaa4k · poc
https://github.com/pavanaa4k/CVE-2023-46604-LAB
This repository provides a detailed lab setup and detection methodology for CVE-2023-46604, focusing on understanding the Apache ActiveMQ RCE vulnerability via the OpenWire protocol. It includes network topology, detection steps using Wireshark, and Suricata IDS rules for mitigation.
Classification
Writeup 95%
Target:
Apache ActiveMQ 5.x
No auth needed
Prerequisites:
Apache ActiveMQ 5.x with OpenWire protocol enabled
nomisec
WORKING POC
by CCIEVoice2009 · remote
https://github.com/CCIEVoice2009/CVE-2023-46604
This repository contains a functional exploit for CVE-2023-46604, targeting Apache ActiveMQ. The exploit sends a crafted payload to trigger a deserialization vulnerability, resulting in remote code execution (RCE). The repository includes a Docker setup for both victim and attacker environments, along with a Python script to deliver the exploit.
Classification
Working Poc 95%
Target:
Apache ActiveMQ 5.18.2
No auth needed
Prerequisites:
Network access to the target ActiveMQ instance · ActiveMQ service running on port 61616 · HTTP server to host the malicious XML payload
nomisec
WRITEUP
by skrkcb2 · remote
https://github.com/skrkcb2/CVE-2023-46604
This repository provides a detailed technical analysis of CVE-2023-46604, focusing on the OpenWire protocol in Apache ActiveMQ. It includes packet structure breakdowns, protocol analysis, and explanations of how the vulnerability leads to remote code execution (RCE).
Classification
Writeup 95%
Target:
Apache ActiveMQ 5.17.3
No auth needed
Prerequisites:
Network access to the target Apache ActiveMQ instance · OpenWire protocol enabled
nomisec
WORKING POC
by tomasmussi · poc
https://github.com/tomasmussi/activemq-cve-2023-46604
This repository contains a functional exploit for CVE-2023-46604, leveraging reflection to instantiate a malicious Spring class that loads a remote XML file containing a ProcessBuilder payload for RCE. The exploit includes both client and server-side components, with a Java-based HTTP server to serve the malicious XML and Python scripts to facilitate the attack.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (versions with Spring dependencies)
No auth needed
Prerequisites:
Network access to the target ActiveMQ broker · Target must have Spring dependencies
nomisec
WORKING POC
by cuanh2333 · remote
https://github.com/cuanh2333/CVE-2023-46604
This repository contains a functional exploit for CVE-2023-46604, targeting Apache ActiveMQ via a deserialization vulnerability. The exploit sends a crafted payload to trigger remote code execution (RCE) on the victim machine, demonstrated through a reverse shell setup.
Classification
Working Poc 95%
Target:
Apache ActiveMQ 5.18.2
No auth needed
Prerequisites:
Access to the target's ActiveMQ service (default port 61616) · A hosted XML payload on an attacker-controlled server
nomisec
WORKING POC
by mranv · remote
https://github.com/mranv/honeypot.rs
This repository contains a functional honeypot designed to simulate a vulnerable Apache ActiveMQ service (CVE-2023-46604) to capture attacker IPs, XML payloads, and RCE commands. It includes a Rust-based server that logs attack details and provides an API for retrieving collected indicators.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (versions affected by CVE-2023-46604)
No auth needed
Prerequisites:
Network access to the target service · Ability to send crafted packets to port 61616
nomisec
WORKING POC
by thinkycx · poc
https://github.com/thinkycx/activemq-rce-cve-2023-46604
This repository contains a functional exploit PoC for CVE-2023-46604, leveraging deserialization in Apache ActiveMQ via crafted ExceptionResponse messages. The exploit sends a malicious payload to trigger remote code execution on vulnerable ActiveMQ instances.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (versions affected by CVE-2023-46604)
No auth needed
Prerequisites:
Network access to the target ActiveMQ broker · Target must be running a vulnerable version of ActiveMQ
nomisec
WORKING POC
by Mudoleto · remote
https://github.com/Mudoleto/Broker_ApacheMQ
This repository contains a functional exploit for CVE-2023-46604, targeting Apache ActiveMQ 5.15.5. The exploit crafts a malicious packet to trigger deserialization of a malicious class, leading to remote code execution (RCE) by loading an external XML configuration file.
Classification
Working Poc 95%
Target:
Apache ActiveMQ 5.15.5
No auth needed
Prerequisites:
Network access to the target ApacheMQ service · External XML configuration file hosted by the attacker
nomisec
WORKING POC
by dcm2406 · remote
https://github.com/dcm2406/CVE-2023-46604
This is a functional exploit PoC for CVE-2023-46604, targeting Apache ActiveMQ via a crafted serialized payload. The script constructs a malicious packet with a ClassPathXmlApplicationContext class name and an attacker-controlled XML payload, which can lead to remote code execution.
Classification
Working Poc 95%
Target:
Apache ActiveMQ (versions affected by CVE-2023-46604)
No auth needed
Prerequisites:
Network access to the target ActiveMQ server · Open port (default 61616)
nomisec
STUB
by vjayant93 · remote
https://github.com/vjayant93/CVE-2023-46604-POC
The repository contains only a minimal README with no exploit code or technical details. It is a placeholder with no functional content.
Target:
unknown
No auth needed
vulncheck_xdb
WORKING POC
remote
https://github.com/dcm2406/CVELab
This repository provides a functional exploit for CVE-2023-46604, targeting Apache ActiveMQ 5.18.2 via a crafted XML payload sent over the OpenWire protocol. It includes detailed setup instructions, exploit code (exploit.py), and a malicious XML payload (poc.xml) to achieve remote code execution (RCE) and establish a reverse shell.
Classification
Working Poc 90%
Target:
Apache ActiveMQ 5.18.2
No auth needed
Prerequisites:
Kali Linux 2023.4 · Ubuntu 22.04.3 LTS · Apache ActiveMQ 5.18.2 · OpenJDK 18 · VMware Workstation 17.5.0
metasploit
WORKING POC
EXCELLENT
by X1r0z, sfewer-r7 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/apache_activemq_rce_cve_2023_46604.rb
This Metasploit module exploits a deserialization vulnerability in Apache ActiveMQ's OpenWire transport unmarshaller, allowing unauthenticated remote code execution via crafted payloads delivered through a malicious XML configuration file.
Classification
Working Poc 100%
Target:
Apache ActiveMQ versions 5.18.0-5.18.2, 5.17.0-5.17.5, 5.16.0-5.16.6, and below 5.15.16
No auth needed
Prerequisites:
Network access to the target's OpenWire port (default: 61616) · Target must be running a vulnerable version of Apache ActiveMQ