Apache RocketMQ RCE vulnerability recurrence (CVE-2023-33246)

0x01 Product Introduction

       RocketMQ is a distributed message middleware developed by Alibaba in 2012. It is specially designed for trillion-level ultra-large-scale message processing. It has the characteristics of high throughput, low latency, massive accumulation, and sequential sending and receiving. It is the necessary infrastructure for Alibaba's Double Eleven shopping carnival and many large-scale Internet business scenarios.

0x02 Vulnerability Overview

         For RocketMQ 5.1.0 and below, under certain conditions, there is a risk of remote command execution. RocketMQ's NameServer, Broker, Controller and other components are exposed on the Internet and lack permission verification. Attackers can use this vulnerability to use the update configuration function to execute commands as the system user running RocketMQ. In addition, attackers can achieve the same effect by forging the content of the RocketMQ protocol.

0x03 range of influence

    Apache RocketMQ <= 5.1.0

    Apache RocketMQ <= 4.9.5

0x04 Recurrence environment

  FOFA:title="RocketMQ"

 0x05 Vulnerability Reappearance

Reproduce directly using the packaged poc environment 

project address:

https://github.com/SuperZero/CVE-2023-33246

 

  Instructions:

java -jar CVE-2023-33246.jar -ip "目标控制台地址" -cmd "执行的命令"

rebound shell 

 0x06 Repair suggestion

  At present, the official release of security repair updates, affected users can upgrade to Apache RocketMQ 5.1.1 or 4.9.6.

   Link: https://rocketmq.apache.org/download/

Guess you like

Origin blog.csdn.net/qq_41904294/article/details/130987233