2024-05-25 21:48:12 +02:00
### [CVE-2024-4040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4040)



### Description
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
### POC
#### Reference
- https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
- https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/0day404/HV-2024-POC
- https://github.com/0xN7y/CVE-2024-4040
- https://github.com/12442RF/POC
2024-05-25 21:48:12 +02:00
- https://github.com/1ncendium/CVE-2024-4040
2025-09-29 16:08:36 +00:00
- https://github.com/AboSteam/POPC
- https://github.com/Ahmadam37/Enumeration
- https://github.com/DMW11525708/wiki
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Linxloop/fork_POC
2024-05-25 21:48:12 +02:00
- https://github.com/Mohammaddvd/CVE-2024-4040
- https://github.com/Mufti22/CVE-2024-4040
- https://github.com/Ostorlab/KEV
- https://github.com/Praison001/CVE-2024-4040-CrushFTP-server
- https://github.com/Stuub/CVE-2024-4040-SSTI-LFI
- https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC
2025-09-29 16:08:36 +00:00
- https://github.com/WhosGa/MyWiki
2024-05-25 21:48:12 +02:00
- https://github.com/Y4tacker/JavaSec
2025-09-29 16:08:36 +00:00
- https://github.com/Yuan08o/pocs
2024-05-25 21:48:12 +02:00
- https://github.com/absholi7ly/absholi7ly
2025-09-29 16:08:36 +00:00
- https://github.com/admin772/POC
- https://github.com/adminlove520/pocWiki
- https://github.com/adysec/POC
2024-05-25 21:48:12 +02:00
- https://github.com/airbus-cert/CVE-2024-4040
2025-09-29 16:08:36 +00:00
- https://github.com/art-of-defence/NSE
- https://github.com/cisp-pte/POC-20241008-sec-fork
- https://github.com/eeeeeeeeee-code/POC
2024-06-22 09:37:59 +00:00
- https://github.com/enomothem/PenTestNote
2024-08-05 18:41:32 +00:00
- https://github.com/entroychang/CVE-2024-4040
2024-05-25 21:48:12 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2025-09-29 16:08:36 +00:00
- https://github.com/frontal1660/VanuatuForensic
- https://github.com/geniuszly/GenCrushSSTIExploit
2024-05-25 21:48:12 +02:00
- https://github.com/getdrive/PoC
- https://github.com/gotr00t0day/CVE-2024-4040
2025-09-29 16:08:36 +00:00
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/iemotion/POC
- https://github.com/ill-deed/CrushFTP-CVE-2024-4040-illdeed
2024-05-25 21:48:12 +02:00
- https://github.com/jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability
2024-08-10 19:04:30 +00:00
- https://github.com/k3ppf0r/2024-PocLib
2025-09-29 16:08:36 +00:00
- https://github.com/laoa1573/wy876
2024-08-05 18:41:32 +00:00
- https://github.com/nitish778191/fitness_app
2024-05-25 21:48:12 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/oLy0/Vulnerability
- https://github.com/olebris/CVE-2024-4040
- https://github.com/pwnfuzz/POCs
2024-05-25 21:48:12 +02:00
- https://github.com/qt2a23/CVE-2024-4040
2025-09-29 16:08:36 +00:00
- https://github.com/rahisec/CVE-2024-4040
2024-05-25 21:48:12 +02:00
- https://github.com/rbih-boulanouar/CVE-2024-4040
2025-09-29 16:08:36 +00:00
- https://github.com/rix4uni/CVE-Nuclei
- https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc
2024-05-25 21:48:12 +02:00
- https://github.com/tanjiti/sec_profile
2025-09-29 16:08:36 +00:00
- https://github.com/tongchengbin/nuclei-sdk
2024-05-25 21:48:12 +02:00
- https://github.com/toxyl/lscve
- https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC
- https://github.com/tucommenceapousser/CVE-2024-4040-Scanner
- https://github.com/wjlin0/poc-doc
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/zgimszhd61/cve-exploit-collection-scanner
2025-09-29 16:08:36 +00:00
- https://github.com/zulloper/cve-poc
2024-05-25 21:48:12 +02:00