# Nexus Repository 3 - 路径遍历漏洞
## 漏洞概述
Sonatype Nexus Repository 3 中存在路径穿越漏洞,允许未认证的攻击者读取系统文件。
## 影响版本
- Nexus Repository 3 所有低于 3.68.1 的版本
## 漏洞细节
攻击者可以通过构造特定的请求,利用路径穿越漏洞读取服务器上的任意文件。
## 漏洞影响
该漏洞允许攻击者未经过认证就访问服务器上的敏感文件,可能导致信息泄露。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Nexus Repository Manager 3 Unauthenticated Path Traversal | https://github.com/banditzCyber0x/CVE-2024-4956 | POC详情 |
2 | CVE-2024-4956 Nuclei Template | https://github.com/xungzzz/CVE-2024-4956 | POC详情 |
3 | Unauthenticated Path Traversal in Nexus Repository 3 | https://github.com/gmh5225/CVE-2024-4956 | POC详情 |
4 | [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner | https://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner | POC详情 |
5 | None | https://github.com/thinhap/CVE-2024-4956-PoC | POC详情 |
6 | None | https://github.com/eoslvs/CVE-2024-4956 | POC详情 |
7 | CVE-2024-4956 : Nexus Repository Manager 3 poc exploit | https://github.com/GoatSecurity/CVE-2024-4956 | POC详情 |
8 | Proof-Of-Concept (POC) for CVE-2024-4956 | https://github.com/TypicalModMaker/CVE-2024-4956 | POC详情 |
9 | Exploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS/Pro versions up to and including 3.68.0 | https://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager | POC详情 |
10 | Sonatype Nexus Repository Manager 3 (LFI) | https://github.com/Cappricio-Securities/CVE-2024-4956 | POC详情 |
11 | CVE-2024-4956 Python exploitation utility | https://github.com/fin3ss3g0d/CVE-2024-4956 | POC详情 |
12 | Unauthenticated Path Traversal in Nexus Repository 3 | https://github.com/erickfernandox/CVE-2024-4956 | POC详情 |
13 | POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal | https://github.com/verylazytech/CVE-2024-4956 | POC详情 |
14 | None | https://github.com/yagyuufellinluvv/CVE-2024-4956 | POC详情 |
15 | None | https://github.com/JolyIrsb/CVE-2024-4956 | POC详情 |
16 | None | https://github.com/UMASANKAR-MG/Path-Traversal-CVE-2024-4956 | POC详情 |
17 | Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956. | https://github.com/An00bRektn/shirocrack | POC详情 |
18 | CVE-2024-4956 Python exploitation utility | https://github.com/XiaomingX/cve-2024-4956 | POC详情 |
19 | Detection and exploitation scripts for CVE-2024-4956 | https://github.com/art-of-defence/CVE-2024-4956 | POC详情 |
20 | Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4956.yaml | POC详情 |
21 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Nexus%20Repository%20Manager%203%20%E6%9C%AA%E6%8E%88%E6%9D%83%E7%9B%AE%E5%BD%95%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2024-4956.md | POC详情 |
22 | https://github.com/vulhub/vulhub/blob/master/nexus/CVE-2024-4956/README.md | POC详情 | |
23 | Quick and easy exploitation of CVE-2024-4956 for LFI. | https://github.com/Buff3st-0v3rfl0w/CVE-2024-4956 | POC详情 |
24 | Nexus Repository 3 Path Traversal (CVE-2024-4956) | https://github.com/amalpvatayam67/day04-nexus-4956 | POC详情 |
暂无评论