top of page

Apache RocketMQ Code Execution (CVE-2023-33246)




Application Details

RocketMQ is cloud-native "messaging, eventing, streaming" real-time data processing platform, covering cloud-edge-device collaboration scenarios.


Vulnerability

Apache RocketMQ could allow a remote attacker to execute arbitrary commands on the system, caused by a flaw when using the update configuration function.


Identification

By sending a specially crafted request to forge the RocketMQ protocol content, an attacker could exploit this vulnerability to execute arbitrary commands on the system.


PAYLOAD -
.......`{"code":25,"flag":0,"language":"JAVA","opaque":0,"serializeTypeCurrentRPC":"JSON","version":395}filterServerNums=1
rocketmqHome=-c $@|sh . echo uid;

Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to execute arbitrary code on the system.


Coverage

Idappcom have created signature 8024196 along with a traffic file for this vulnerability.


References


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional

Comments


bottom of page