Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-33246

Опубликовано: 24 мая 2023
Источник: redhat
CVSS3: 9.8

Описание

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

A vulnerability was found in Apache RocketMQ where, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification. This flaw allows an attacker to use the update configuration function to execute commands as the system users that RocketMQ is running as.

Отчет

Red Hat has evaluated this vulnerability and this affects only RocketMQ server and not rocketmq-client's, which are included in Red Hat Product Catalog. Therefore, no products delivered by Red Hat are affected.

Дополнительная информация

Статус:

Critical
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2317265rocketmq: Apache RocketMQ Arbitrary Code Injection

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 2 лет назад

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

CVSS3: 9.8
github
больше 2 лет назад

Apache RocketMQ may have remote code execution vulnerability when using update configuration function

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость платформы обмена сообщениями RocketMQ , связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольные команды

9.8 Critical

CVSS3