Security for everyone

CVE-2024-4956 Scanner

CVE-2024-4956 scanner - Local File Inclusion (LFI) vulnerability in Sonatype Nexus Repository Manager 3


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




Sonatype Nexus Repository Manager 3 is a widely used software by development and DevOps teams to manage and store various build artifacts. It supports multiple repository formats and integrates with CI/CD pipelines to enhance productivity and security. Nexus Repository Manager is essential for organizations to manage open-source and third-party libraries efficiently. It is deployed in many enterprises to ensure seamless artifact management and dependency resolution. The software is highly regarded for its robust features and ease of use in managing complex development workflows.

The Local File Inclusion (LFI) vulnerability in Sonatype Nexus Repository Manager 3 allows an attacker to read arbitrary system files. This vulnerability can be exploited by an unauthenticated attacker using specially crafted URLs. It enables unauthorized access to sensitive files on the server. The issue has been addressed in version 3.68.1 of the software.

The vulnerability exists in the handling of file paths within Sonatype Nexus Repository Manager 3. An attacker can exploit the vulnerability by crafting a URL that includes a series of directory traversal sequences. This allows the attacker to navigate the file system and access files outside the intended directory. The vulnerable endpoint fails to properly sanitize the input path, making it susceptible to Local File Inclusion. The specific parameter responsible for this vulnerability is the file path included in the GET request. By manipulating this parameter, attackers can access restricted files like /etc/passwd.

Exploiting this vulnerability can lead to significant security risks, including unauthorized access to sensitive system files. Attackers could gain insights into the system configuration, user accounts, and other critical information. This could be used to facilitate further attacks, such as privilege escalation or launching targeted exploits. The exposure of sensitive files might also lead to data breaches and compromise of the entire system's security.

By using the securityforeveryone platform, users can effectively manage and mitigate cyber threats to their digital assets. Our platform offers comprehensive scanning capabilities to identify and report vulnerabilities, configuration errors, and security weaknesses. Becoming a member allows you to leverage our extensive database of known vulnerabilities and receive timely alerts and detailed remediation guidance. Enhance your security posture by proactively addressing potential threats with our robust and user-friendly tools. Join securityforeveryone to ensure your systems remain secure and resilient against cyber threats.


cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture