Skip to content

Apache ActiveMQ Default Login

ID: activemq-default-login

Severity: high

Author: pdteam

Tags: apache,activemq,default-login

Apache ActiveMQ default login information was discovered.

id: activemq-default-login
info:
name: Apache ActiveMQ Default Login
author: pdteam
severity: high
description: Apache ActiveMQ default login information was discovered.
reference:
- https://knowledge.broadcom.com/external/article/142813/vulnerability-apache-activemq-admin-con.html
metadata:
max-request: 2
tags: apache,activemq,default-login
http:
- raw:
- |
GET /admin/ HTTP/1.1
Host: {{Hostname}}
Authorization: Basic {{base64(username + ':' + password)}}
payloads:
username:
- user
- admin
password:
- user
- admin
attack: pitchfork
matchers:
- type: word
words:
- 'Welcome to the Apache ActiveMQ Console of <b>'
- '<h2>Broker</h2>'
condition: and
# digest: 4b0a00483046022100b9734844776d8f16f8ce9cb918dda612064388daed648b3a96a2d1ec10a5f74502210091c83b4c0ed5809bb2feb3265642818c79ad2ba993ae370f827f7de6e5ecea3c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/default-logins/activemq/activemq-default-login.yaml"

View on Github