Exploited
CWE
94
Advisory Published
Advisory Published
Updated

CVE-2023-33246: Apache RocketMQ Command Execution Vulnerability

First published: Wed May 24 2023(Updated: )

For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution.  Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as. Additionally, an attacker can achieve the same effect by forging the RocketMQ protocol content.  To prevent these attacks, users are recommended to upgrade to version 5.1.1 or above for using RocketMQ 5.x or 4.9.6 or above for using RocketMQ 4.x .

Credit: security@apache.org security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
Apache RocketMQ<5.1.1
maven/org.apache.rocketmq:rocketmq-namesrv>=5.0.0<5.1.1
5.1.1
maven/org.apache.rocketmq:rocketmq-controller>=5.0.0<5.1.1
5.1.1
maven/org.apache.rocketmq:rocketmq-namesrv>=4.0.0<4.9.6
4.9.6
maven/org.apache.rocketmq:rocketmq-broker>=5.0.0<5.1.1
5.1.1
Apache RocketMQ<4.9.7
Apache RocketMQ>=5.0.0<5.1.2

Remedy

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Peer vulnerabilities

(Found alongside the following vulnerabilities)

Frequently Asked Questions

  • What is the vulnerability ID for the Apache RocketMQ command execution vulnerability?

    The vulnerability ID for the Apache RocketMQ command execution vulnerability is CVE-2023-33246.

  • How severe is the Apache RocketMQ command execution vulnerability?

    The Apache RocketMQ command execution vulnerability is classified as critical with a severity value of 9.

  • Which versions of RocketMQ are affected by the command execution vulnerability?

    RocketMQ versions 5.1.0 and below are affected by the command execution vulnerability.

  • What is the risk associated with the Apache RocketMQ command execution vulnerability?

    The Apache RocketMQ command execution vulnerability poses a risk of remote command execution.

  • How can the Apache RocketMQ command execution vulnerability be exploited?

    The vulnerability can be exploited by an attacker by using leaked and unverified components of RocketMQ, such as NameServer, Broker, and Controller.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203