### [CVE-2016-3088](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3088) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. ### POC #### Reference - https://www.exploit-db.com/exploits/42283/ #### Github - https://github.com/0ps/pocassistdb - https://github.com/1120362990/vulnerability-list - https://github.com/20142995/pocsuite3 - https://github.com/422926799/haq5201314 - https://github.com/6point6/vulnerable-docker-launcher - https://github.com/7hang/cyber-security-interview - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Awrrays/FrameVul - https://github.com/EvilAnne/Python_Learn - https://github.com/ExpLife0011/awesome-windows-kernel-security-development - https://github.com/HimmelAward/Goby_POC - https://github.com/Kaizhe/attacker - https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088 - https://github.com/MelanyRoob/Goby - https://github.com/MoeTaher/Broker_Writeup - https://github.com/NCSU-DANCE-Research-Group/CDL - https://github.com/Ondrik8/exploit - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/SexyBeast233/SecBooks - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/YutuSec/ActiveMQ_Crack - https://github.com/Z0fhack/Goby_POC - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/bigblackhat/oFx - https://github.com/cl4ym0re/CVE-2016-3088 - https://github.com/cyberaguiar/CVE-2016-3088 - https://github.com/gobysec/Goby - https://github.com/hktalent/bug-bounty - https://github.com/jiushill/haq5201314 - https://github.com/jweny/pocassistdb - https://github.com/k8gege/Aggressor - https://github.com/k8gege/Ladon - https://github.com/k8gege/PowerLadon - https://github.com/lnick2023/nicenice - https://github.com/openx-org/BLEN - https://github.com/pravinsrc/NOTES-windows-kernel-links - https://github.com/pudiding/CVE-2016-3088 - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/retr0-13/Goby - https://github.com/sponkmonk/Ladon_english_update - https://github.com/t0m4too/t0m4to - https://github.com/vonderchild/CVE-2016-3088 - https://github.com/xbfding/XiaoBai_exploit - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/yichensec/Bug_writer - https://github.com/yuag/bgscan