Path: blob/master/documentation/modules/auxiliary/scanner/http/apache_activemq_traversal.md
55908 views
Vulnerable Application
This module exploits a directory traversal vulnerability in Apache ActiveMQ 5.3.1 and 5.3.2 on Windows systems. The flaw exists in the Jetty ResourceHandler that ships with these versions, allowing an unauthenticated attacker to read arbitrary files from the target host.
The vulnerability is tracked as CVE-2010-1587.
Setup
To test this module you need a Windows host running one of the affected versions:
Download Apache ActiveMQ 5.3.1 or 5.3.2.
Extract the archive and run
bin\activemq.batto start the broker.The web console listens on port 8161 by default.
Verification Steps
Start msfconsole
Do:
use auxiliary/scanner/http/apache_activemq_traversalDo:
set RHOSTS [target IP]Do:
set RPORT 8161Do:
runYou should see the contents of the requested file saved as loot.
Options
FILEPATH
The path of the file to retrieve from the target system, relative to the drive root. The default value is /windows\\win.ini. Backslashes must be used for path separators on Windows targets.
DEPTH
The number of traversal sequences (/\..) to prepend to the request. The default is 4. If the file is not found, try increasing this value.