Skip to content

Conversation

@daffainfo
Copy link
Contributor

Template / PR Information

The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.

Template Validation

I've validated this template locally?

  • YES
  • NO

Added impact and remediation sections to CVE-2023-37582.yaml.
@pussycat0x pussycat0x merged commit cc2ddd2 into projectdiscovery:main Oct 16, 2025
3 checks passed
@algora-pbc
Copy link

algora-pbc bot commented Oct 22, 2025

🎉🎈 @daffainfo has been awarded $200 by ProjectDiscovery! 🎈🎊

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants