Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-7238 PoC — Sonatype Nexus Repository Manager OSS/Pro 访问控制错误漏洞

Source
Associated Vulnerability
Title:Sonatype Nexus Repository Manager OSS/Pro 访问控制错误漏洞 (CVE-2019-7238)
Description:Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
Description
nmap scripts for vuln cve-2020-0796 & cve-2019-7238 & cve2019-11580 & cve2017-6327 
Readme
# nmap-scripts
nmap scripts for vuln cve-2020-0796 & cve-2019-7238 & cve2019-11580 & cve2017-6327 

## CVE-2020-0796 

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.

---

## CVE-2019-7238
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.

## CVE-2019-11580

Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.

## CVE-2017-6327

The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process. In this type of occurrence, after gaining access to the system, the attacker may attempt to elevate their privileges.

File Snapshot

[4.0K] /data/pocs/d2d5c43ed30d7e07c0ad6eb6e2c6b536a57dd59e ├── [4.8K] cve-2020-0796.nse ├── [ 16K] http-vuln-cve2019-11580.nse ├── [9.3K] http-vuln-cve2019-7238.nse ├── [1.1K] LICENSE ├── [1.6K] README.md └── [2.9K] symantic-CVE-2017-6327.nse 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →