CVE-2023-46604

CRITICAL KEV RANSOMWARE NUCLEI LAB

Java OpenWire - Deserialization RCE

Title source: llm

Description

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

Exploits (39)

nomisec WORKING POC 123 stars
by SaumyajeetDas · remote
https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ
nomisec WORKING POC 63 stars
by ImuSpirit · poc
https://github.com/ImuSpirit/ActiveMQ_RCE_Pro_Max
nomisec WORKING POC 40 stars
by Arlenhiack · remote
https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit
nomisec WORKING POC 39 stars
by evkl1d · remote
https://github.com/evkl1d/CVE-2023-46604
nomisec WORKING POC 29 stars
by trganda · local
https://github.com/trganda/ActiveMQ-RCE
nomisec WORKING POC 18 stars
by duck-sec · remote
https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell
nomisec WORKING POC 5 stars
by justdoit-cai · remote
https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp
nomisec WORKING POC 4 stars
by vulncheck-oss · remote
https://github.com/vulncheck-oss/cve-2023-46604
nomisec NO CODE 3 stars
by h3x3h0g · poc
https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up
nomisec WORKING POC 2 stars
by RockyDesigne · poc
https://github.com/RockyDesigne/SSP-Assignment-3-RCEYouLater
nomisec WORKING POC 2 stars
by dcm2406 · poc
https://github.com/dcm2406/CVE-Lab
nomisec WORKING POC 2 stars
by mrpentst · remote
https://github.com/mrpentst/CVE-2023-46604
nomisec WORKING POC 2 stars
by NKeshawarz · remote
https://github.com/NKeshawarz/CVE-2023-46604-RCE
nomisec WORKING POC 2 stars
by LiritoShawshark · poc
https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence
nomisec WORKING POC 1 stars
by Catherines77 · poc
https://github.com/Catherines77/ActiveMQ-EXPtools
nomisec WRITEUP 1 stars
by vaishnavucv · poc
https://github.com/vaishnavucv/Project-Vuln-Detection-N-Mitigation_101
nomisec WORKING POC 1 stars
by pulentoski · remote
https://github.com/pulentoski/CVE-2023-46604
nomisec WORKING POC 1 stars
by stegano5 · remote
https://github.com/stegano5/ExploitScript-CVE-2023-46604
github WORKING POC 1 stars
by oscerd · pythonpoc
https://github.com/oscerd/nice-cve-poc/tree/main/CVE-2023-46604
nomisec WORKING POC 1 stars
by minhangxiaohui · remote
https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604
nomisec NO CODE
by mkdemir · poc
https://github.com/mkdemir/activemq-lockbit-analysis
nomisec STUB
by jbogdanov · poc
https://github.com/jbogdanov/activemq-cve-playground
nomisec WRITEUP
by sangrok-jeon · poc
https://github.com/sangrok-jeon/CVE-2023-46604-Analysis
nomisec WRITEUP
by pavanaa4k · poc
https://github.com/pavanaa4k/CVE-2023-46604-LAB
nomisec WORKING POC
by CCIEVoice2009 · remote
https://github.com/CCIEVoice2009/CVE-2023-46604
nomisec WRITEUP
by skrkcb2 · remote
https://github.com/skrkcb2/CVE-2023-46604
nomisec WORKING POC
by tomasmussi · poc
https://github.com/tomasmussi/activemq-cve-2023-46604
nomisec WORKING POC
by cuanh2333 · remote
https://github.com/cuanh2333/CVE-2023-46604
nomisec NO CODE
by nitzanoligo · remote
https://github.com/nitzanoligo/CVE-2023-46604-demo
nomisec WORKING POC
by mranv · remote
https://github.com/mranv/honeypot.rs
nomisec WORKING POC
by thinkycx · poc
https://github.com/thinkycx/activemq-rce-cve-2023-46604
nomisec WORKING POC
by Mudoleto · remote
https://github.com/Mudoleto/Broker_ApacheMQ
nomisec WORKING POC
by dcm2406 · remote
https://github.com/dcm2406/CVE-2023-46604
github STUB
by kaushik-reddy · pythonpoc
https://github.com/kaushik-reddy/CVE-s-Working-Exploits/tree/main/CVE-2023-46604
nomisec STUB
by vjayant93 · remote
https://github.com/vjayant93/CVE-2023-46604-POC
vulncheck_xdb WORKING POC
remote
https://github.com/dcm2406/CVELab
metasploit WORKING POC EXCELLENT
by X1r0z, sfewer-r7 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/apache_activemq_rce_cve_2023_46604.rb

Nuclei Templates (1)

Apache ActiveMQ - Remote Code Execution
CRITICALVERIFIEDby Ice3man,Mzack9999,pdresearch
Shodan: product:"ActiveMQ OpenWire Transport" || cpe:"cpe:2.3:a:apache:activemq" || product:"activemq openwire transport"

Scores

CVSS v3 10.0
EPSS 0.9444
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull symptoma/activemq:5.15.10
docker pull kalilinux/kali-rolling
+34 more repos

Details

CISA KEV 2023-11-02
VulnCheck KEV 2023-11-02
InTheWild.io 2023-11-02
ENISA EUVD EUVD-2023-2719
Ransomware Use Confirmed
CWE
CWE-502
Status published
Products (9)
apache/activemq < 5.15.16
apache/activemq_legacy_openwire_module < 5.15.16
debian/debian_linux 10.0
debian/debian_linux 11.0
netapp/e-series_santricity_unified_manager
netapp/e-series_santricity_web_services_proxy
netapp/santricity_storage_plugin
org.apache.activemq/activemq-client 0 - 5.15.16Maven
org.apache.activemq/activemq-openwire-legacy 5.8.0 - 5.15.16Maven
Published Oct 27, 2023
KEV Added Nov 02, 2023
Tracked Since Feb 18, 2026