ApacheMQ


Nmap discovered what appears to be Apache ActiveMQ services on the target ports 5672, 61613, and 61616 The initial Nmap scan result left an ambiguous impression as those ports all appear relevant to one another

┌──(kali㉿kali)-[~/archive/htb/labs/broker]
└─$ nmap -Pn -sV --script amqp-info -p5672,61613,61616 $IP                   
starting nmap 7.94 ( https://nmap.org ) at 2023-12-13 19:30 CET
Nmap scan report for 10.10.11.243
Host is up (0.13s latency).
 
PORT      STATE SERVICE  VERSION
5672/tcp  open  amqp?
|_amqp-info: ERROR: AQMP:handshake expected header (1) frame, but was 65
| fingerprint-strings: 
|   dnsstatusrequesttcp, dnsversionbindreqtcp, getrequest, httpoptions, rpccheck, rtsprequest, sslsessionreq, terminalservercookie: 
|     AMQP
|     AMQP
|     amqp:decode-error
|_    7Connection from client using unsupported AMQP attempted
61613/tcp open  stomp    Apache ActiveMQ
| fingerprint-strings: 
|   help4stomp: 
|     ERROR
|     content-type:text/plain
|     message:Unknown STOMP action: HELP
|     org.apache.activemq.transport.stomp.protocolexception: Unknown STOMP action: HELP
|     org.apache.activemq.transport.stomp.protocolconverter.onstompcommand(protocolconverter.java:258)
|     org.apache.activemq.transport.stomp.stomptransportfilter.oncommand(stomptransportfilter.java:85)
|     org.apache.activemq.transport.transportsupport.doconsume(transportsupport.java:83)
|     org.apache.activemq.transport.tcp.tcptransport.dorun(tcptransport.java:233)
|     org.apache.activemq.transport.tcp.tcptransport.run(tcptransport.java:215)
|_    java.lang.thread.run(thread.java:750)
61616/tcp open  apachemq ActiveMQ OpenWire transport
| fingerprint-strings: 
|   null: 
|     ActiveMQ
|     TcpNoDelayEnabled
|     SizePrefixDisabled
|     CacheSize
|     ProviderName 
|     ActiveMQ
|     StackTraceEnabled
|     PlatformDetails 
|     Java
|     CacheEnabled
|     TightEncodingEnabled
|     MaxFrameSize
|     MaxInactivityDuration
|     MaxInactivityDurationInitalDelay
|     ProviderVersion 
|_    5.15.15
service detection performed. please report any incorrect results at https://nmap.org/submit/ .
nmap done: 1 IP address (1 host up) scanned in 41.95 seconds

The target system has been identified to be hosting an instance of Apache ActiveMQ. The target ports 5672, 61613, and 61616 are all part of the tech stack of Apache ActiveMQ

Additionally, the ActiveMQ OpenWire transport service leaked the version information of the instance, 5.15.5, which has been identified to be vulnerable to [[Broker_CVE-2023-46604#[CVE-2023-46604](https //nvd.nist.gov/vuln/detail/CVE-2023-46604)|RCE]]