TROYANOSYVIRUS
Volver a CVEs

CVE-2023-33246

CRITICALCISA KEV
9.8

Descripcion

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado5/24/2023
Ultima modificacion10/23/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorApache
ProductoRocketMQ
Nombre vulnerabilidadApache RocketMQ Command Execution Vulnerability
Fecha inclusion KEV2023-09-06
Fecha limite remediacion2023-09-27
Uso en ransomwareUnknown

Productos afectados

apache:rocketmq

Debilidades (CWE)

CWE-94

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.