### [CVE-2024-4040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4040) ![](https://img.shields.io/static/v1?label=Product&message=CrushFTP&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine&color=brighgreen) ### Description A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. ### POC #### Reference - https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/ - https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/ #### Github - https://github.com/0day404/HV-2024-POC - https://github.com/0xN7y/CVE-2024-4040 - https://github.com/12442RF/POC - https://github.com/1ncendium/CVE-2024-4040 - https://github.com/AboSteam/POPC - https://github.com/Ahmadam37/Enumeration - https://github.com/DMW11525708/wiki - https://github.com/Lern0n/Lernon-POC - https://github.com/Linxloop/fork_POC - https://github.com/Mohammaddvd/CVE-2024-4040 - https://github.com/Mufti22/CVE-2024-4040 - https://github.com/Ostorlab/KEV - https://github.com/Praison001/CVE-2024-4040-CrushFTP-server - https://github.com/Stuub/CVE-2024-4040-SSTI-LFI - https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC - https://github.com/WhosGa/MyWiki - https://github.com/Y4tacker/JavaSec - https://github.com/Yuan08o/pocs - https://github.com/absholi7ly/absholi7ly - https://github.com/admin772/POC - https://github.com/adminlove520/pocWiki - https://github.com/adysec/POC - https://github.com/airbus-cert/CVE-2024-4040 - https://github.com/art-of-defence/NSE - https://github.com/cisp-pte/POC-20241008-sec-fork - https://github.com/eeeeeeeeee-code/POC - https://github.com/enomothem/PenTestNote - https://github.com/entroychang/CVE-2024-4040 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/frontal1660/VanuatuForensic - https://github.com/geniuszly/GenCrushSSTIExploit - https://github.com/getdrive/PoC - https://github.com/gotr00t0day/CVE-2024-4040 - https://github.com/greenberglinken/2023hvv_1 - https://github.com/iemotion/POC - https://github.com/ill-deed/CrushFTP-CVE-2024-4040-illdeed - https://github.com/jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability - https://github.com/k3ppf0r/2024-PocLib - https://github.com/laoa1573/wy876 - https://github.com/nitish778191/fitness_app - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/oLy0/Vulnerability - https://github.com/olebris/CVE-2024-4040 - https://github.com/pwnfuzz/POCs - https://github.com/qt2a23/CVE-2024-4040 - https://github.com/rahisec/CVE-2024-4040 - https://github.com/rbih-boulanouar/CVE-2024-4040 - https://github.com/rix4uni/CVE-Nuclei - https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc - https://github.com/tanjiti/sec_profile - https://github.com/tongchengbin/nuclei-sdk - https://github.com/toxyl/lscve - https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC - https://github.com/tucommenceapousser/CVE-2024-4040-Scanner - https://github.com/wjlin0/poc-doc - https://github.com/wy876/POC - https://github.com/wy876/wiki - https://github.com/zgimszhd61/cve-exploit-collection-scanner - https://github.com/zulloper/cve-poc