cve/2024/CVE-2024-4040.md
2025-09-29 16:08:36 +00:00

77 lines
3.5 KiB
Markdown

### [CVE-2024-4040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4040)
![](https://img.shields.io/static/v1?label=Product&message=CrushFTP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine&color=brighgreen)
### Description
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
### POC
#### Reference
- https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
- https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/
#### Github
- https://github.com/0day404/HV-2024-POC
- https://github.com/0xN7y/CVE-2024-4040
- https://github.com/12442RF/POC
- https://github.com/1ncendium/CVE-2024-4040
- https://github.com/AboSteam/POPC
- https://github.com/Ahmadam37/Enumeration
- https://github.com/DMW11525708/wiki
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Linxloop/fork_POC
- https://github.com/Mohammaddvd/CVE-2024-4040
- https://github.com/Mufti22/CVE-2024-4040
- https://github.com/Ostorlab/KEV
- https://github.com/Praison001/CVE-2024-4040-CrushFTP-server
- https://github.com/Stuub/CVE-2024-4040-SSTI-LFI
- https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC
- https://github.com/WhosGa/MyWiki
- https://github.com/Y4tacker/JavaSec
- https://github.com/Yuan08o/pocs
- https://github.com/absholi7ly/absholi7ly
- https://github.com/admin772/POC
- https://github.com/adminlove520/pocWiki
- https://github.com/adysec/POC
- https://github.com/airbus-cert/CVE-2024-4040
- https://github.com/art-of-defence/NSE
- https://github.com/cisp-pte/POC-20241008-sec-fork
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/enomothem/PenTestNote
- https://github.com/entroychang/CVE-2024-4040
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/frontal1660/VanuatuForensic
- https://github.com/geniuszly/GenCrushSSTIExploit
- https://github.com/getdrive/PoC
- https://github.com/gotr00t0day/CVE-2024-4040
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/iemotion/POC
- https://github.com/ill-deed/CrushFTP-CVE-2024-4040-illdeed
- https://github.com/jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability
- https://github.com/k3ppf0r/2024-PocLib
- https://github.com/laoa1573/wy876
- https://github.com/nitish778191/fitness_app
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oLy0/Vulnerability
- https://github.com/olebris/CVE-2024-4040
- https://github.com/pwnfuzz/POCs
- https://github.com/qt2a23/CVE-2024-4040
- https://github.com/rahisec/CVE-2024-4040
- https://github.com/rbih-boulanouar/CVE-2024-4040
- https://github.com/rix4uni/CVE-Nuclei
- https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc
- https://github.com/tanjiti/sec_profile
- https://github.com/tongchengbin/nuclei-sdk
- https://github.com/toxyl/lscve
- https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC
- https://github.com/tucommenceapousser/CVE-2024-4040-Scanner
- https://github.com/wjlin0/poc-doc
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/zgimszhd61/cve-exploit-collection-scanner
- https://github.com/zulloper/cve-poc