### [CVE-2019-15588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15588) ![](https://img.shields.io/static/v1?label=Product&message=Nexus%20Repository%20Manager&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection%20-%20Generic%20(CWE-77)&color=brighgreen) ### Description There is an OS Command Injection in Nexus Repository Manager <= 2.14.14 (bypass CVE-2019-5475) that could allow an attacker a Remote Code Execution (RCE). All instances using CommandLineExecutor.java with user-supplied data is vulnerable, such as the Yum Configuration Capability. ### POC #### Reference - https://hackerone.com/reports/688270 - https://hackerone.com/reports/688270 - https://support.sonatype.com/hc/en-us/articles/360033490774-CVE-2019-5475-Nexus-Repository-Manager-2-OS-Command-Injection-2019-08-09 - https://support.sonatype.com/hc/en-us/articles/360033490774-CVE-2019-5475-Nexus-Repository-Manager-2-OS-Command-Injection-2019-08-09 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CLincat/vulcat - https://github.com/EXP-Docs/CVE-2019-15588 - https://github.com/EXP-Docs/CVE-2019-5475 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/lyy289065406/CVE-2019-15588 - https://github.com/lyy289065406/CVE-2019-5475 - https://github.com/lyy289065406/lyy289065406 - https://github.com/tdcoming/Vulnerability-engine