cve/2019/CVE-2019-5475.md

34 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-5475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5475)
![](https://img.shields.io/static/v1?label=Product&message=Nexus%20Repository%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=OS%20Command%20Injection%20(CWE-78)&color=brighgreen)
### Description
The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
### POC
#### Reference
- https://hackerone.com/reports/654888
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CLincat/vulcat
- https://github.com/EXP-Docs/CVE-2019-15588
- https://github.com/EXP-Docs/CVE-2019-5475
- https://github.com/HimmelAward/Goby_POC
- https://github.com/SexyBeast233/SecBooks
- https://github.com/TesterCC/exp_poc_library
- https://github.com/Z0fhack/Goby_POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-
- https://github.com/lyy289065406/CVE-2019-15588
- https://github.com/lyy289065406/CVE-2019-5475
- https://github.com/lyy289065406/lyy289065406
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/rabbitmask/CVE-2019-5475-EXP