Rapid7 Vulnerability & Exploit Database

CVE-2023-21554 - QueueJumper - MSMQ RCE Check

Back to Search

CVE-2023-21554 - QueueJumper - MSMQ RCE Check

Disclosed
04/11/2023
Created
09/05/2023

Description

This module checks the provided hosts for the CVE-2023-21554 vulnerability by sending a MSMQ message with an altered DataLength field within the SRMPEnvelopeHeader that overflows the given buffer. On patched systems, the error is caught and no response is sent back. On vulnerable systems, the integer wraps around and depending on the length could cause an out-of-bounds write. In the context of this module a response is sent back, which indicates that the system is vulnerable.

Author(s)

  • Wayne Low
  • Haifei Li
  • Bastian Kanbach <bastian.kanbach@securesystems.de>

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/msmq/cve_2023_21554_queuejumper
msf auxiliary(cve_2023_21554_queuejumper) > show actions
    ...actions...
msf auxiliary(cve_2023_21554_queuejumper) > set ACTION < action-name >
msf auxiliary(cve_2023_21554_queuejumper) > show options
    ...show and set options...
msf auxiliary(cve_2023_21554_queuejumper) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;