POC详情: d2d5c43ed30d7e07c0ad6eb6e2c6b536a57dd59e

来源
关联漏洞
标题: Sonatype Nexus Repository Manager OSS/Pro 访问控制错误漏洞 (CVE-2019-7238)
描述:Sonatype Nexus Repository Manager(NXRM)是美国Sonatype公司的一款Maven仓库管理器。 Sonatype NXRM OSS/Pro 3.6.2版本至3.14.0版本中存在安全漏洞,该漏洞源于程序没有进行充分的访问控制。远程攻击者可利用该漏洞在服务器上执行Java代码。
描述
nmap scripts for vuln cve-2020-0796 & cve-2019-7238 & cve2019-11580 & cve2017-6327 
介绍
# nmap-scripts
nmap scripts for vuln cve-2020-0796 & cve-2019-7238 & cve2019-11580 & cve2017-6327 

## CVE-2020-0796 

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.

---

## CVE-2019-7238
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.

## CVE-2019-11580

Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.

## CVE-2017-6327

The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process. In this type of occurrence, after gaining access to the system, the attacker may attempt to elevate their privileges.

文件快照

[4.0K] /data/pocs/d2d5c43ed30d7e07c0ad6eb6e2c6b536a57dd59e ├── [4.8K] cve-2020-0796.nse ├── [ 16K] http-vuln-cve2019-11580.nse ├── [9.3K] http-vuln-cve2019-7238.nse ├── [1.1K] LICENSE ├── [1.6K] README.md └── [2.9K] symantic-CVE-2017-6327.nse 0 directories, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。