mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-07 05:26:37 +00:00
30 lines
1.5 KiB
Markdown
30 lines
1.5 KiB
Markdown
### [CVE-2019-15588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15588)
|
|

|
|

|
|
&color=brighgreen)
|
|
|
|
### Description
|
|
|
|
There is an OS Command Injection in Nexus Repository Manager <= 2.14.14 (bypass CVE-2019-5475) that could allow an attacker a Remote Code Execution (RCE). All instances using CommandLineExecutor.java with user-supplied data is vulnerable, such as the Yum Configuration Capability.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://hackerone.com/reports/688270
|
|
- https://hackerone.com/reports/688270
|
|
- https://support.sonatype.com/hc/en-us/articles/360033490774-CVE-2019-5475-Nexus-Repository-Manager-2-OS-Command-Injection-2019-08-09
|
|
- https://support.sonatype.com/hc/en-us/articles/360033490774-CVE-2019-5475-Nexus-Repository-Manager-2-OS-Command-Injection-2019-08-09
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/CLincat/vulcat
|
|
- https://github.com/EXP-Docs/CVE-2019-15588
|
|
- https://github.com/EXP-Docs/CVE-2019-5475
|
|
- https://github.com/developer3000S/PoC-in-GitHub
|
|
- https://github.com/hectorgie/PoC-in-GitHub
|
|
- https://github.com/lyy289065406/CVE-2019-15588
|
|
- https://github.com/lyy289065406/CVE-2019-5475
|
|
- https://github.com/lyy289065406/lyy289065406
|
|
- https://github.com/tdcoming/Vulnerability-engine
|
|
|