Page 3 of 26 results (0.012 seconds)

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Sonatype Nexus Repository Manager 2.x before 2.14.17 and 3.x before 3.22.1. Admin users can retrieve the LDAP server system username/password (as configured in nxrm) in cleartext. Se detectó un problema en Sonatype Nexus Repository Manager versiones 2.x versiones anteriores a 2.14.17 y versiones 3.x versiones anteriores a 3.22.1. Los usuarios administradores pueden recuperar el nombre de usuario y contraseña del sistema del servidor LDAP (tal como está configurado en nxrm) en texto sin cifrar. • https://support.sonatype.com/hc/en-us/articles/360045360854 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

There is an OS Command Injection in Nexus Repository Manager <= 2.14.14 (bypass CVE-2019-5475) that could allow an attacker a Remote Code Execution (RCE). All instances using CommandLineExecutor.java with user-supplied data is vulnerable, such as the Yum Configuration Capability. Se presenta una Inyección de Comandos de Sistema Operativo en Nexus Repository Manager versiones anteriores a 2.14.14 incluyéndola (omite el CVE-2019-5475) lo que podría permitir a un atacante una Ejecución de Código Remota. Todas las instancias del archivo CommandLineExecutor.java con datos suministrados por el usuario son vulnerables, tal y como la Yum Configuration Capability. • https://github.com/EXP-Docs/CVE-2019-15588 https://hackerone.com/reports/688270 https://support.sonatype.com/hc/en-us/articles/360033490774-CVE-2019-5475-Nexus-Repository-Manager-2-OS-Command-Injection-2019-08-09 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

Sonatype Nexus Repository Manager 2.x before 2.14.15 and 3.x before 3.19, and IQ Server before 72, has remote code execution. Sonatype Nexus Repository Manager versiones 2.x anteriores a 2.14.15 y versiones 3.x anteriores a 3.19, y IQ Server versiones anteriores a 72, presenta una ejecución de código remota. • https://issues.sonatype.org/secure/ReleaseNote.jspa https://support.sonatype.com/hc/en-us/articles/360036132453 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Sonatype Nexus Repository Manager 2.x before 2.14.15 allows Remote Code Execution. Sonatype Nexus Repository Manager versiones 2.x anteriores a 2.14.15, permite la ejecución de código remota. • https://support.sonatype.com/hc/en-us/articles/360035055794 •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 4

The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability. El plugin Nexus Yum Repository en la versión 2 es vulnerable a la ejecución remota de código cuando las peticiones que usan CommandLineExecutor.java reciben datos vulnerables como la capacidad de configuración de Yum. • https://github.com/rabbitmask/CVE-2019-5475-EXP https://github.com/jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager- https://github.com/EXP-Docs/CVE-2019-5475 https://hackerone.com/reports/654888 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •