Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-4956 PoC — Nexus Repository 3 - Path Traversal

Source
Associated Vulnerability
Title:Nexus Repository 3 - Path Traversal (CVE-2024-4956)
Description:Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.
Description
Quick and easy exploitation of CVE-2024-4956 for LFI.
Readme
# CVE-2024-4956
Quick and easy exploitation of CVE-2024-4956 for LFI based on original PoC from: VeryLazyTech, https://github.com/verylazytech/CVE-2024-4956.

This implementation takes 2 arguments, url and file, and presents the output of the file if it is found.
File Snapshot

[4.0K] /data/pocs/1a97f8f559b23e8f5684d22261d81ed115dd3877 ├── [1.6K] CVE-2024-4956.py └── [ 264] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →