cve/2023/CVE-2023-40044.md

30 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-40044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40044)
![](https://img.shields.io/static/v1?label=Product&message=WS_FTP%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen)
### Description
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.  
### POC
#### Reference
- http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html
- https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044
- https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044
- https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/
- https://www.theregister.com/2023/10/02/ws_ftp_update/
#### Github
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/XRSec/AWVS-Update
- https://github.com/bhaveshharmalkar/learn365
2024-05-28 08:49:17 +00:00
- https://github.com/f0ur0four/Insecure-Deserialization
2024-05-25 21:48:12 +02:00
- https://github.com/getdrive/PoC
- https://github.com/kenbuckler/WS_FTP-CVE-2023-40044
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile