Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
22 commits
Select commit Hold shift + click to select a range
0cc045d
Merge pull request #4 from OWASP/master
Aarush289 Jan 20, 2026
2a32fe2
Merge pull request #8 from OWASP/master
Aarush289 Feb 5, 2026
4090ae3
Merge pull request #9 from OWASP/master
Aarush289 Feb 8, 2026
2a0b83e
Add FortiWeb authentication bypass vulnerability check
Aarush289 Feb 10, 2026
b1ffe4e
Remove FortiWeb auth bypass vulnerability entry
Aarush289 Feb 10, 2026
6db5ee7
Fix vulnerability name in wp_plugin_cve_2021_38314.yaml
Aarush289 Feb 10, 2026
6fd226a
Rename CVE identifier from 39314 to 39320
Aarush289 Feb 10, 2026
03675d5
Merge pull request #10 from OWASP/master
Aarush289 Feb 12, 2026
0d3399e
Merge pull request #13 from OWASP/master
Aarush289 Feb 18, 2026
ace2db9
Merge pull request #14 from OWASP/master
Aarush289 Feb 23, 2026
0711d39
Merge pull request #16 from OWASP/master
Aarush289 Mar 3, 2026
0857127
Merge pull request #18 from OWASP/master
Aarush289 Mar 8, 2026
44a9ae6
Merge pull request #19 from OWASP/master
Aarush289 Mar 20, 2026
95ac772
Merge pull request #20 from OWASP/master
Aarush289 Apr 9, 2026
f5cc36a
New module added
Aarush289 Apr 13, 2026
a4e6fb8
severity corrected
Aarush289 Apr 13, 2026
f5a2acd
randomness removed from arguments
Aarush289 Apr 13, 2026
7cc7771
randomness removed
Aarush289 Apr 13, 2026
1a47bbf
Merge branch 'master' into cve-2026-34197
Aarush289 Apr 13, 2026
6cb8e2a
arguments in data updated
Aarush289 Apr 13, 2026
a96fbf5
add step to cover Unauthenticated cases
Aarush289 Apr 13, 2026
8e7f580
Merge branch 'master' into cve-2026-34197
Aarush289 Apr 14, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions docs/Modules.md
Original file line number Diff line number Diff line change
Expand Up @@ -129,6 +129,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke

## Vuln Modules

- '**activemq_cve_2026_34197_jolokia_rce_vuln**' - check Jolokia endpoint for RCE vulnerability CVE-2026-34197
- '**aiohttp_cve_2024_23334_vuln**' - check the target for CVE-2024-23334
- '**apache_ofbiz_cve_2024_38856**' - check the target for Apache OFBiz CVE-2024-38856
- '**apache_struts_vuln**' - check Apache Struts for CVE-2017-5638
Expand Down
106 changes: 106 additions & 0 deletions nettacker/modules/vuln/activemq_cve_2026_34197_jolokia_rce.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,106 @@
info:
name: activemq_cve_2026_34197_jolokia_rce_vuln
author: Nettacker Team
severity: 8.8
description: |
Detects CVE-2026-34197 in Apache ActiveMQ Classic via Jolokia API.
The vulnerability allows execution of addNetworkConnector which can
load remote configuration via vm:// and xbean: protocol.
This module sends a safe detection payload and checks for successful
execution indicators in the response.

reference:
- https://nvd.nist.gov/vuln/detail/CVE-2026-34197
- https://horizon3.ai/attack-research/disclosures/cve-2026-34197-activemq-rce-jolokia/

profiles:
- vuln
- http
- high_severity
- cve
- cve2026
- activemq
- jolokia
- rce

payloads:
- library: http
steps:
- method: post
timeout: 10
headers:
User-Agent: "{user_agent}"
Content-Type: "application/json"
Authorization: "Basic YWRtaW46YWRtaW4="
Comment thread
Aarush289 marked this conversation as resolved.
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/api/jolokia/"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 8161
- 80
- 443

data: |
{{
"type": "exec",
"mbean": "org.apache.activemq:type=Broker,brokerName=localhost",
"operation": "addNetworkConnector",
"arguments": ["static:(vm://nettacker-probe-000?brokerConfig=none)"]
}}

response:
condition_type: and
conditions:
status_code:
regex: '200'
reverse: false
content:
regex: '(?s)(?=.*addNetworkConnector)(?=.*org.apache.activemq)'
reverse: false

- method: post
timeout: 10
headers:
User-Agent: "{user_agent}"
Content-Type: "application/json"
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/api/jolokia/"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 8161
- 80
- 443

data: |
{{
"type": "exec",
"mbean": "org.apache.activemq:type=Broker,brokerName=localhost",
"operation": "addNetworkConnector",
"arguments": ["static:(vm://nettacker-probe-000?brokerConfig=none)"]
}}
Comment thread
coderabbitai[bot] marked this conversation as resolved.

response:
condition_type: and
conditions:
status_code:
regex: '200'
reverse: false
content:
regex: '(?s)(?=.*addNetworkConnector)(?=.*org.apache.activemq)'
reverse: false
Loading