Логотип exploitDog
bind:CVE-2023-33246
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-33246

Количество 4

Количество 4

redhat логотип

CVE-2023-33246

больше 2 лет назад

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

CVSS3: 9.8
EPSS: Критический
nvd логотип

CVE-2023-33246

больше 2 лет назад

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-x3cq-8f32-5f63

больше 2 лет назад

Apache RocketMQ may have remote code execution vulnerability when using update configuration function

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2023-06032

больше 2 лет назад

Уязвимость платформы обмена сообщениями RocketMQ , связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-33246

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

CVSS3: 9.8
94%
Критический
больше 2 лет назад
nvd логотип
CVE-2023-33246

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

CVSS3: 9.8
94%
Критический
больше 2 лет назад
github логотип
GHSA-x3cq-8f32-5f63

Apache RocketMQ may have remote code execution vulnerability when using update configuration function

CVSS3: 9.8
94%
Критический
больше 2 лет назад
fstec логотип
BDU:2023-06032

Уязвимость платформы обмена сообщениями RocketMQ , связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
94%
Критический
больше 2 лет назад

Уязвимостей на страницу