org.sonatype.nexus:nexus-repository@3.27.0-03 vulnerabilities

  • latest version

    3.70.1-02

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    6 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.sonatype.nexus:nexus-repository package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Directory Traversal

    Affected versions of this package are vulnerable to Directory Traversal. An attacker can craft a URL to return any file as a download, including system files outside of Nexus Repository application scope, without any authentication.

    How to fix Directory Traversal?

    Upgrade org.sonatype.nexus:nexus-repository to version 3.68.1 or higher.

    [,3.68.1)
    • M
    Server-side Request Forgery (SSRF)

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). A remote authenticated attacker can potentially perform network enumeration.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade org.sonatype.nexus:nexus-repository to version 3.36.0 or higher.

    [,3.36.0)
    • C
    HTTP Header Injection

    Affected versions of this package are vulnerable to HTTP Header Injection. By sending a crafted HTTP request, a remote attacker may disclose sensitive information or request external resources from a vulnerable instance.

    How to fix HTTP Header Injection?

    Upgrade org.sonatype.nexus:nexus-repository to version 3.34.0-01 or higher.

    [,3.34.0-01)
    • M
    Information Exposure

    Affected versions of this package are vulnerable to Information Exposure. A remote authenticated attacker is able to get a list of blob files and read the content of a blob file via a GET request without having been granted access.

    How to fix Information Exposure?

    Upgrade org.sonatype.nexus:nexus-repository to version 3.31.0-01 or higher.

    [,3.31.0-01)
    • M
    Information Exposure

    Affected versions of this package are vulnerable to Information Exposure. An unauthenticated user can submit a crafted HTTP request to get a list of files and directories that exist in Nexus Repository’s webroot. This is a set of static resources that form part of the Nexus Repository UI and does not expose customers' data.

    How to fix Information Exposure?

    Upgrade org.sonatype.nexus:nexus-repository to version 3.30.1-01 or higher.

    [,3.30.1-01)
    • M
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). An attacker with a local account can create entities with specially crafted properties that, when viewed by an administrator, can execute arbitrary JavaScript in the context of the NXRM application.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.sonatype.nexus:nexus-repository to version 3.30.1-01 or higher.

    [,3.30.1-01)
    • M
    Information Exposure

    Affected versions of this package are vulnerable to Information Exposure. An authenticated attacker can retrieve the user token generated by another user in a minute set of circumstances.

    How to fix Information Exposure?

    Upgrade org.sonatype.nexus:nexus-repository to version 3.30.1-01 or higher.

    [,3.30.1-01)