Sonatype, the corporate behind the favored Nexus Repository Supervisor, has issued safety advisories addressing two essential vulnerabilities affecting Nexus Repository 2.x OSS/Professional variations.
These vulnerabilities, recognized as CVE-2024-5082 and CVE-2024-5083, might probably enable attackers to use the system by distant code execution (RCE) and cross-site scripting (XSS) assaults.
All earlier variations as much as and together with 2.15.1 are affected, and customers are strongly urged to improve to model 2.15.2 for defense.
Maximizing Cybersecurity ROI: Knowledgeable Suggestions for SME & MSP Leaders - Attend Free Webinar
CVE-2024-5082: Distant Code Execution (RCE)
CVE-2024-5082 is a essential vulnerability that would enable an attacker to carry out distant code execution in Nexus Repository Supervisor 2.x.
By publishing a specifically crafted Maven artifact with a payload, the attacker might execute malicious code when the artifact is downloaded by any person or system interacting with the repository.
Affected Variations
- All variations of Sonatype Nexus Repository Supervisor 2.x OSS/Professional as much as and together with 2.15.1.
Fastened Model
- The problem has been addressed in Sonatype Nexus Repository Supervisor 2.x OSS/Professional model 2.15.2.
This vulnerability poses a critical risk, as an attacker might achieve management of the system by executing arbitrary code.
Though Sonatype has not but noticed any energetic exploitation within the wild, the severity of the vulnerability necessitates instant motion.
Customers are strongly suggested to improve to Nexus Repository Supervisor model 2.15.2. If upgrading isn’t instantly doable, Sonatype has offered a customized Net Utility Firewall (WAF) rule as a short lived mitigation choice to cut back the danger of exploitation.
CVE-2024-5083: Saved Cross-Web site Scripting (XSS)
Along with the RCE vulnerability, Sonatype additionally disclosed CVE-2024-5083, a saved cross-site scripting (XSS) vulnerability.
This flaw permits an attacker to publish a Maven artifact embedded with malicious XSS payloads.
If an administrator or one other person with privileged entry views the artifact of their browser, the attacker might execute undesirable actions with the privileges of the administrator’s account.
Affected Variations
- All variations of Sonatype Nexus Repository Supervisor 2.x OSS/Professional as much as and together with 2.15.1.
Fastened Model
- The problem has been fastened in model 2.15.2 of Nexus Repository Supervisor.
Saved XSS assaults can compromise the safety of administrative classes, probably permitting attackers to govern repository settings, achieve unauthorized entry, or exfiltrate delicate knowledge. Though no energetic exploitation has been reported, the potential influence is important.
As with the RCE vulnerability, Sonatype advises upgrading to model 2.15.2. If upgrading isn’t doable, directors can use the offered Nginx configuration to mitigate the danger of XSS assaults.
Sonatype has reiterated that Nexus Repository Supervisor 2.x is at the moment beneath Prolonged Upkeep, they usually suggest migrating to Nexus Repository 3 for continued safety updates and have enhancements.
For customers unable emigrate instantly, the corporate strongly encourages upgrading to model 2.15.2 to safe their deployments.
Simplify and pace up Menace Evaluation Workflow by Auto-detonating Cyber Assaults in a Malware sandbox