# N/A
## 漏洞概述
Sonatype Nexus Repository在3.21.2之前版本中存在Java EL (Expression Language) 注入漏洞。
## 影响版本
- 3.21.2之前的版本
## 漏洞细节
此漏洞允许攻击者通过特定的注入技术执行恶意代码,利用Java EL表达式来操控应用程序逻辑。
## 漏洞影响
该漏洞可能使攻击者能够执行任意代码或操作,导致敏感信息泄露或服务器被控制。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | CVE-2020-10199 CVE-2020-10204 Python POC | https://github.com/wsfengfan/CVE-2020-10199-10204 | POC详情 |
2 | CVE-2020-10199、CVE-2020-10204、CVE-2020-11444 | https://github.com/jas502n/CVE-2020-10199 | POC详情 |
3 | CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI. | https://github.com/magicming200/CVE-2020-10199_CVE-2020-10204 | POC详情 |
4 | CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显) | https://github.com/zhzyker/CVE-2020-10199_POC-EXP | POC详情 |
5 | CVE-2020-10199 回显版本 | https://github.com/aleenzz/CVE-2020-10199 | POC详情 |
6 | Sonatype Nexus 3.21.01 - Remote Code Execution (Authenticated - Updated) | https://github.com/hugosg97/CVE-2020-10199-Nexus-3.21.01 | POC详情 |
7 | Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-10199.yaml | POC详情 |
8 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Nexus%20Repository%20Manager%203%20group%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-10199.md | POC详情 |
9 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/nexus-cve-2020-10199.yml | POC详情 |
10 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/nexus-cve-2020-10204.yml | POC详情 |
11 | https://github.com/vulhub/vulhub/blob/master/nexus/CVE-2020-10199/README.md | POC详情 |