ApacheMQ
Nmap discovered what appears to be Apache ActiveMQ services on the target ports 5672, 61613, and 61616
The initial Nmap scan result left an ambiguous impression as those ports all appear relevant to one another
┌──(kali㉿kali)-[~/archive/htb/labs/broker]
└─$ nmap -Pn -sV --script amqp-info -p5672,61613,61616 $IP
starting nmap 7.94 ( https://nmap.org ) at 2023-12-13 19:30 CET
Nmap scan report for 10.10.11.243
Host is up (0.13s latency).
PORT STATE SERVICE VERSION
5672/tcp open amqp?
|_amqp-info: ERROR: AQMP:handshake expected header (1) frame, but was 65
| fingerprint-strings:
| dnsstatusrequesttcp, dnsversionbindreqtcp, getrequest, httpoptions, rpccheck, rtsprequest, sslsessionreq, terminalservercookie:
| AMQP
| AMQP
| amqp:decode-error
|_ 7Connection from client using unsupported AMQP attempted
61613/tcp open stomp Apache ActiveMQ
| fingerprint-strings:
| help4stomp:
| ERROR
| content-type:text/plain
| message:Unknown STOMP action: HELP
| org.apache.activemq.transport.stomp.protocolexception: Unknown STOMP action: HELP
| org.apache.activemq.transport.stomp.protocolconverter.onstompcommand(protocolconverter.java:258)
| org.apache.activemq.transport.stomp.stomptransportfilter.oncommand(stomptransportfilter.java:85)
| org.apache.activemq.transport.transportsupport.doconsume(transportsupport.java:83)
| org.apache.activemq.transport.tcp.tcptransport.dorun(tcptransport.java:233)
| org.apache.activemq.transport.tcp.tcptransport.run(tcptransport.java:215)
|_ java.lang.thread.run(thread.java:750)
61616/tcp open apachemq ActiveMQ OpenWire transport
| fingerprint-strings:
| null:
| ActiveMQ
| TcpNoDelayEnabled
| SizePrefixDisabled
| CacheSize
| ProviderName
| ActiveMQ
| StackTraceEnabled
| PlatformDetails
| Java
| CacheEnabled
| TightEncodingEnabled
| MaxFrameSize
| MaxInactivityDuration
| MaxInactivityDurationInitalDelay
| ProviderVersion
|_ 5.15.15
service detection performed. please report any incorrect results at https://nmap.org/submit/ .
nmap done: 1 IP address (1 host up) scanned in 41.95 secondsThe target system has been identified to be hosting an instance of Apache ActiveMQ.
The target ports 5672, 61613, and 61616 are all part of the tech stack of Apache ActiveMQ
Additionally, the ActiveMQ OpenWire transport service leaked the version information of the instance, 5.15.5, which has been identified to be vulnerable to [[Broker_CVE-2023-46604#[CVE-2023-46604](https //nvd.nist.gov/vuln/detail/CVE-2023-46604)|RCE]]