Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Sonatype | Nexus Repository | 3.0.0 ~ 3.68.0 | cpe:2.3:a:sonatype:nexus_repository_manager:3.0.0:*:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Nexus Repository Manager 3 Unauthenticated Path Traversal | https://github.com/banditzCyber0x/CVE-2024-4956 | POC Details |
| 2 | CVE-2024-4956 Nuclei Template | https://github.com/xungzzz/CVE-2024-4956 | POC Details |
| 3 | Unauthenticated Path Traversal in Nexus Repository 3 | https://github.com/gmh5225/CVE-2024-4956 | POC Details |
| 4 | [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner | https://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner | POC Details |
| 5 | None | https://github.com/thinhap/CVE-2024-4956-PoC | POC Details |
| 6 | None | https://github.com/eoslvs/CVE-2024-4956 | POC Details |
| 7 | CVE-2024-4956 : Nexus Repository Manager 3 poc exploit | https://github.com/GoatSecurity/CVE-2024-4956 | POC Details |
| 8 | Proof-Of-Concept (POC) for CVE-2024-4956 | https://github.com/TypicalModMaker/CVE-2024-4956 | POC Details |
| 9 | Exploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS/Pro versions up to and including 3.68.0 | https://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager | POC Details |
| 10 | Sonatype Nexus Repository Manager 3 (LFI) | https://github.com/Cappricio-Securities/CVE-2024-4956 | POC Details |
| 11 | CVE-2024-4956 Python exploitation utility | https://github.com/fin3ss3g0d/CVE-2024-4956 | POC Details |
| 12 | Unauthenticated Path Traversal in Nexus Repository 3 | https://github.com/erickfernandox/CVE-2024-4956 | POC Details |
| 13 | POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal | https://github.com/verylazytech/CVE-2024-4956 | POC Details |
| 14 | None | https://github.com/yagyuufellinluvv/CVE-2024-4956 | POC Details |
| 15 | None | https://github.com/JolyIrsb/CVE-2024-4956 | POC Details |
| 16 | None | https://github.com/UMASANKAR-MG/Path-Traversal-CVE-2024-4956 | POC Details |
| 17 | Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956. | https://github.com/An00bRektn/shirocrack | POC Details |
| 18 | CVE-2024-4956 Python exploitation utility | https://github.com/XiaomingX/cve-2024-4956 | POC Details |
| 19 | Detection and exploitation scripts for CVE-2024-4956 | https://github.com/art-of-defence/CVE-2024-4956 | POC Details |
| 20 | Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4956.yaml | POC Details |
| 21 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Nexus%20Repository%20Manager%203%20%E6%9C%AA%E6%8E%88%E6%9D%83%E7%9B%AE%E5%BD%95%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2024-4956.md | POC Details |
| 22 | https://github.com/vulhub/vulhub/blob/master/nexus/CVE-2024-4956/README.md | POC Details | |
| 23 | Quick and easy exploitation of CVE-2024-4956 for LFI. | https://github.com/Buff3st-0v3rfl0w/CVE-2024-4956 | POC Details |
| 24 | Nexus Repository 3 Path Traversal (CVE-2024-4956) | https://github.com/amalpvatayam67/day04-nexus-4956 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet