APromptRiskDBThreat intelligence atlas
AI Vulnerability Context

CVE-2023-33246 - Apache RocketMQ

Several components of Apache RocketMQ, including NameServer, Broker, and Controller, are exposed to the extranet and lack permission verification. An attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as or achieve the same effect by forging the RocketMQ protocol content.

AI Vulnerability ContextCISA KEVApache

Record summary

A quick snapshot of what this page covers.

CISA KEVyesWhether CISA lists this as exploited.
Techniques0AI attack methods connected to this vulnerability.
Case studies0Examples where this vulnerability is mentioned.

Vulnerability status

How serious this vulnerability is and whether it is known to be exploited.

CISA KEV
CVE ID
CVE-2023-33246
Vendor/project
Apache
Product
RocketMQ
Vulnerability name
Apache RocketMQ Command Execution Vulnerability
Date added
2023-09-06
Due date
2023-09-27
Known ransomware campaign use
Unknown
CWE-94

Exploit context

What the vulnerability is about.

No description available. The source record only contains identifiers and metadata.

Source

Where this page information comes from.