## https://sploitus.com/exploit?id=8AE8D343-531A-55E2-9C16-08EE1E899E87
# ActiveMQ_CVE-2023-46604
PY实现快速构造数据流量并发包;两个gadgets类的实现都有,org.springframework.context.support.FileSystemXmlApplicationContext和org.springframework.context.support.ClassPathXmlApplicationContext ,FIleSystemXml可以绕过一些ids 检测类设备
![image](https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604/assets/39674723/aae29cee-66f5-450f-90af-373f550d5e98)