Skip to content

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

Notifications You must be signed in to change notification settings

1ncendium/CVE-2024-4040

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-4040 PoC

Python exploit for CVE-2024-4040

Description

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

Options

-h  --help               Show this screen.
-t  --target             Specify target URL
-f  --file               Specify file to include

Examples

Only test if vulnerable:     exploit.py -t http://10.10.1.23:8080
Include /etc/passwd:         exploit.py -t http://10.10.1.23:8080 -f /etc/passwd

Requirements

  • Python3

Installation

git clone https://github.com/1ncendium/CVE-2024-4040.git
cd CVE-2024-4040
python3 exploit.py -t http://target:8080

About

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages