Lucene search

K
metasploitH00die, MalaykeMSF:AUXILIARY-SCANNER-MISC-ROCKETMQ_VERSION-
HistoryJun 07, 2023 - 9:29 p.m.

Apache RocketMQ Version Scanner

2023-06-0721:29:53
h00die, Malayke
www.rapid7.com
104

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.9%

Version scanner for the Apache RocketMQ product.

### This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
  include Msf::Exploit::Remote::Tcp
  include Msf::Auxiliary::Scanner
  include Msf::Auxiliary::Report
  include Msf::Auxiliary::Rocketmq

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Apache RocketMQ Version Scanner',
        'Description' => %q{
          Version scanner for the Apache RocketMQ product.
        },
        'Author' => [
          'h00die',
          'Malayke' # CVE-2023-33246 code
        ],
        'References' => [
          ['URL', 'https://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT/blob/main/check.py'],
          ['URL', 'https://github.com/apache/rocketmq']
        ],
        'License' => MSF_LICENSE,
        'Notes' => {
          'Stability' => [],
          'Reliability' => [],
          'SideEffects' => []
        }
      )
    )
  end

  def run_host(_ip)
    res = send_version_request

    if res.nil?
      print_error('Invalid or no response received')
      return
    end

    parsed_data = parse_rocketmq_data(res)
    # grab some data that we need/want out of the response
    output = "RocketMQ version #{parsed_data['version']}"
    output += " found with brokers: #{parsed_data['brokerDatas']}" if parsed_data['brokerDatas']
    print_good(output)
  end
end

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.9%