You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
sonatype/nexus-public: Dev Mode Path Traversal Vulnerability
Moderate
JLLeitschuh
published
GHSA-wgj6-vj7p-978wMar 22, 2021
Package
Sonatype Nexus
Affected versions
All
Patched versions
None
Description
This vulnerability only impacted development, not production instances of Sonatype Nexus Repository. Fixing this as a user is not required. No CVE was requested for this reason.
Impact
When run in development mode, ie. with either the environment variable NEXUS_RESOURCE_DIRS or the system property nexus.resource.dirs the DevModeResources contains a web-facing path traversal vulnerability.
This vulnerability only impacted development, not production instances of Sonatype Nexus Repository. Fixing this as a user is not required. No CVE was requested for this reason.
Impact
When run in development mode, ie. with either the environment variable
NEXUS_RESOURCE_DIRS
or the system propertynexus.resource.dirs
theDevModeResources
contains a web-facing path traversal vulnerability.This report can be seen here:
https://lgtm.com/projects/g/sonatype/nexus-public/snapshot/b857cc737f8c33493f3f12942648d148ce33e8c8/files/components/nexus-base/src/main/java/org/sonatype/nexus/internal/webresources/DevModeResources.java?sort=name&dir=ASC&mode=heatmap#L124
This can enable attackers to exfiltrate the contents of the local file system where Nexus is running.
By default, this environment variable is set when launching with the
nxrm.groovy
script.https://github.com/sonatype/nexus-public/blob/880eca848d131577b86c13bf2e7cd3f875dbb408/nxrm.groovy#L1083
Patches
No fixes have been issued.
Workarounds
None provided.