Remote Code Execution (RCE) Affecting org.sonatype.nexus:nexus-extdirect package, versions [,3.21.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Attacked
EPSS
94.38% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Remote Code Execution (RCE) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGSONATYPENEXUS-565707
  • published15 Apr 2020
  • disclosed13 Apr 2020
  • creditAlvaro Muñoz

Introduced: 13 Apr 2020

CVE-2020-10199  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade org.sonatype.nexus:nexus-extdirect to version 3.21.2 or higher.

Overview

org.sonatype.nexus:nexus-extdirect is a Repository Manager.

Affected versions of this package are vulnerable to Remote Code Execution (RCE). The vulnerability allows for an attacker with any type of account on NXRM to execute arbitrary code by crafting a malicious request to NXRM. We have mitigated the issue by adjusting the configuration of third-party library that allowed for this attack. This advisory provides the pertinent information needed to properly address this vulnerability, along with the details on how to reach us if you have any further questions or concerns.

CVSS Base Scores

version 3.1