Apache Software Foundation Apache Rocketmq vulnerabilities

3 known vulnerabilities affecting apache_software_foundation/apache_rocketmq.

Total CVEs
3
CISA KEV
1
actively exploited
Public exploits
2
Exploited in wild
2
Severity breakdown
CRITICAL2HIGH1

Vulnerabilities

Page 1 of 1
CVE-2024-23321HIGHCVSS 8.8≥ 4.5.2, ≤ 5.2.02024-07-22
CVE-2024-23321 [HIGH] CWE-200 CVE-2024-23321: For RocketMQ versions 5.2.0 and below, under certain conditions, there is a risk of exposure of sens For RocketMQ versions 5.2.0 and below, under certain conditions, there is a risk of exposure of sensitive Information to an unauthorized actor even if RocketMQ is enabled with authentication and authorization functions. An attacker, possessing regular user privileges or listed in the IP whitelist, could potentially acquire the administrator's account
cvelistv5nvd
CVE-2023-37582CRITICALCVSS 9.8ExploitedPoC≥ 5.0.0, ≤ 5.1.1≤ 4.9.62023-07-12
CVE-2023-37582 [CRITICAL] CWE-94 Apache RocketMQ: Possible remote code execution when using the update configuration function Apache RocketMQ: Possible remote code execution when using the update configuration function The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerabi
cvelistv5
CVE-2023-33246CRITICALCVSS 9.8KEVPoC≥ 5.0.0, ≤ 5.1.1≤ 4.9.62023-05-24
CVE-2023-33246 [CRITICAL] CWE-94 CVE-2023-33246: For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command e For RocketMQ versions 5.1.0 and below, under certain conditions, there is a risk of remote command execution. Several components of RocketMQ, including NameServer, Broker, and Controller, are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function to execute com
cvelistv5nvd