Apache ActiveMQ 漏洞列表
共找到 6 个与 Apache ActiveMQ 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2023-46604: Apache ActiveMQ RCE POC
Apache ActiveMQ RCE Fofa: -
Apache ActiveMQ Artemis Console存在默认账号密码 无POC
Apache ActiveMQ Artemis Console存在默认账号密码,攻击者可以登录后台获取敏感信息。 -
CVE-2016-3088: Apache ActiveMQ Fileserver - Arbitrary File Write POC
Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request via the Fileserver web application. -
CVE-2018-8006: Apache ActiveMQ <=5.15.5 - Cross-Site Scripting POC
Apache ActiveMQ versions 5.0.0 to 5.15.5 are vulnerable to cross-site scripting via the web based administration console on the queue.jsp page. The root cause of this issue is improper data filtering of the QueueFilter parameter. -
CVE-2023-46604: Apache ActiveMQ - Remote Code Execution POC
Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath. Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue. -
Apache ActiveMQ /api/jolokia/list 未授权访问漏洞(CVE-2024-32114) 无POC
Apache ActiveMQ 是基于 Java Message Service (JMS) 的开源消息中间件。Jolokia通过REST API提供了JMX over HTTP的能力。受影响版本中,由于ActiveMQ集成了Jolokia并未对 Jolokia JMX REST API 和 Message REST API 添加身份校验,未授权的攻击者可利用暴露的API与消息代理进行交互,或者使用 Message REST API 发送和接收消息,甚至清除或删除消息队列和主题。