### [CVE-2024-4956](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4956) ![](https://img.shields.io/static/v1?label=Product&message=Nexus%20Repository&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.0.0%3C%3D%203.68.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen) ### Description Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1. ### POC #### Reference - https://support.sonatype.com/hc/en-us/articles/29416509323923 #### Github - https://github.com/0day404/HV-2024-POC - https://github.com/12442RF/POC - https://github.com/AboSteam/POPC - https://github.com/An00bRektn/shirocrack - https://github.com/Buff3st-0v3rfl0w/CVE-2024-4956 - https://github.com/Cappricio-Securities/CVE-2024-4956 - https://github.com/DMW11525708/wiki - https://github.com/GoatSecurity/CVE-2024-4956 - https://github.com/J1ezds/Vulnerability-Wiki-page - https://github.com/JolyIrsb/CVE-2024-4956 - https://github.com/Lern0n/Lernon-POC - https://github.com/Linxloop/fork_POC - https://github.com/Ostorlab/KEV - https://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/CVE - https://github.com/TypicalModMaker/CVE-2024-4956 - https://github.com/UMASANKAR-MG/Path-Traversal-CVE-2024-4956 - https://github.com/WhosGa/MyWiki - https://github.com/X1r0z/JettyFuzz - https://github.com/XiaomingX/awesome-poc-for-red-team - https://github.com/XiaomingX/cve-2024-4956 - https://github.com/Yuan08o/pocs - https://github.com/Zenrho/zenrho-cves-research - https://github.com/admin772/POC - https://github.com/adminlove520/pocWiki - https://github.com/adysec/POC - https://github.com/amalpvatayam67/day04-nexus-4956 - https://github.com/art-of-defence/CVE-2024-4956 - https://github.com/banditzCyber0x/CVE-2024-4956 - https://github.com/cisp-pte/POC-20241008-sec-fork - https://github.com/codeb0ss/CVE-2024-4956-PoC - https://github.com/cyberwithcyril/VulhubPenTestingReport - https://github.com/eeeeeeeeee-code/POC - https://github.com/enomothem/PenTestNote - https://github.com/erickfernandox/CVE-2024-4956 - https://github.com/fin3ss3g0d/CVE-2024-4956 - https://github.com/fin3ss3g0d/Shiro1Extractor - https://github.com/fin3ss3g0d/Shiro1Tools - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/gmh5225/CVE-2024-4956 - https://github.com/greenberglinken/2023hvv_1 - https://github.com/iemotion/POC - https://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner - https://github.com/ifconfig-me/Path-Traversal-Scanner - https://github.com/k3ppf0r/2024-PocLib - https://github.com/laoa1573/wy876 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/oLy0/Vulnerability - https://github.com/onewinner/POCS - https://github.com/plzheheplztrying/cve_monitor - https://github.com/securitycipher/daily-bugbounty-writeups - https://github.com/tanjiti/sec_profile - https://github.com/thinhap/CVE-2024-4956-PoC - https://github.com/verylazytech/CVE-2024-4956 - https://github.com/wjlin0/poc-doc - https://github.com/wy876/POC - https://github.com/wy876/wiki - https://github.com/xungzzz/CVE-2024-4956 - https://github.com/zhanpengliu-tencent/medium-cve