Lucene search

K
symantecSymantec Security ResponseSMNTC-110744
HistoryOct 15, 2019 - 12:00 a.m.

Sonatype Nexus Repository Manager CVE-2019-15588 OS Command Injection Vulnerability

2019-10-1500:00:00
Symantec Security Response
www.symantec.com
20

0.008 Low

EPSS

Percentile

81.1%

Description

Sonatype Nexus Repository Manager is prone to an OS command-injection vulnerability. An attacker may exploit this issue to inject and execute arbitrary commands within the context of the affected application; this may aid in further attacks. Versions prior to Nexus Repository Manager OSS/Pro 2.14.15 are vulnerable.

Technologies Affected

  • Sonatype Nexus Repository Manager 2.0
  • Sonatype Nexus Repository Manager 2.10
  • Sonatype Nexus Repository Manager 2.13
  • Sonatype Nexus Repository Manager 2.14.12
  • Sonatype Nexus Repository Manager 2.14.13
  • Sonatype Nexus Repository Manager 2.14.14

Recommendations

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic

Implement multiple redundant layers of security.
Various memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker’s ability to exploit this vulnerability to execute arbitrary code.

Run all software as a nonprivileged user with minimal access rights.
To limit the impact of latent vulnerabilities, configure database servers and other applications to run as a nonadministrative user with minimal access rights.

Updates are available. Please see the references or vendor advisory for more information.