.. / CVE-2024-4956

Exploit for Sonatype Nexus Repository Manager 3 - Local File Inclusion (CVE-2024-4956)

Description:

Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.

Nuclei Template

View the template here CVE-2024-4956.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2024/CVE-2024-4956.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2024-4956
https://x.com/phithon_xg/status/1793517567560335428?s=46&t=GMMfJwV8rhJHdcj2TUympg
https://github.com/fkie-cad/nvd-json-data-feeds
https://support.sonatype.com/hc/en-us/articles/29416509323923