Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-37152 PoC — Sonatype Nexus Repository Manager 跨站脚本漏洞

Source
Associated Vulnerability
Title:Sonatype Nexus Repository Manager 跨站脚本漏洞 (CVE-2021-37152)
Description:Sonatype Nexus Repository Manager(NXRM)是美国Sonatype公司的一款存储库管理器,它主要用于管理、存储和分发软件等。 Sonatype Nexus Repository Manager 存在跨站脚本漏洞,该漏洞源于该网站的上下文中可以运行JavaScript代码。攻击者可利用该漏洞触发Sonatype Nexus Repository Manager的跨站点脚本从而执行恶意命令。
Description
Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack
Readme
# CVE-2021-37152

Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack

# exploit

This exploit is designed for accessing and scanning network clients
and you will easily access and prepare for a mitm attack,
the exploit will attack in layers three and two, you will learn more
in the following, this exploit will be performed on most devices The range
in the tested models is as follows and attack options 
TP-LINK 54Mbps Wirless ADSL2+ Modem Router TD-W8901G power 9V == 0.85A ,
TD-W9960-v1.20 , TP-LINK TL-WR840N300Mbps New Design Wireless N Router
Exploit works on most devices tested on these models

# Divaces Test

- TP-LINK
- TP-LINK 54Mbps Wirless ADSL2+ Modem Router TD-W8901G power 9V == 0.85A 
- TD-W9960-v1.20
- TP-LINK TL-WR840N300Mbps New Design Wireless N Router
- 
# Install

*Git clone exploit :*
```
  git clone https://github.com/lhashashinl/CVE-2021-37152.git
 ```
 *Edit as code import class*
 ```
  exploit(target="").pyload(message="" , DefaultGetway="" , interface="" , count=None , countLeyer2=)
 ```
 *Run :*
 ```
  sudo python3 CVE-2021-37152.py
 ```
File Snapshot

[4.0K] /data/pocs/1fb8d481c496a976dfb16a1f3d474a9744092c74 ├── [5.7K] CVE-2021-37152.py ├── [ 34K] LICENSE └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.