PT-2024-2993 · Crushftp · Crushftp
Simon Garrelou
·
Published
2024-04-19
·
Updated
2025-07-04
·
CVE-2024-4040
9.8
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
The vulnerable software is CrushFTP, a managed file transfer vendor. The vulnerability affects all versions before 10.7.1 and 11.1.0 on all platforms, allowing unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
The exploit can be used to read arbitrary files, including sensitive system files, and to gain admin access. Over 1,400 CrushFTP internet-facing servers are vulnerable to this bug, with the majority located in Canada, Germany, and the US.
Rapid7's analysis confirms that the vulnerability is fully unauthenticated and trivially exploitable, allowing for arbitrary file read, authentication bypass, and remote code execution.
An exploit module is available for this vulnerability, and a Python script can be used to scan for compromised servers.
It is crucial for organizations to review their CrushFTP logs for signs of potential compromise and to patch their systems immediately.
#CrushFTP #Vulnerability #RCE #Exploit #CyberSecurity #Infosec #ZeroDay #SSTI #VFS
Exploit
Fix
RCE
Code Injection
Improper Privilege Management
Related Identifiers
Affected Products
References · 108
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/crushftp_fileread_cve_2024_4040.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC⭐ 54 🔗 7 · Exploit
- 🔥 https://github.com/airbus-cert/CVE-2024-4040⭐ 47 🔗 8 · Exploit
- 🔥 https://github.com/rbih-boulanouar/CVE-2024-4040⭐ 13 🔗 2 · Exploit
- 🔥 https://github.com/gotr00t0day/CVE-2024-4040⭐ 11 🔗 3 · Exploit
- 🔥 https://github.com/geniuszlyy/GenCrushSSTIExploit⭐ 7 🔗 1 · Exploit
- 🔥 https://github.com/geniuszly/GenCrushSSTIExploit⭐ 7 🔗 1 · Exploit
- 🔥 https://github.com/jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability⭐ 3 🔗 1 · Exploit
- 🔥 https://github.com/entroychang/CVE-2024-4040⭐ 2 🔗 1 · Exploit
- 🔥 https://github.com/Mohammaddvd/CVE-2024-4040⭐ 3 · Exploit
- 🔥 https://reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual · Exploit
- 🔥❌ https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC · Exploit, Deleted
- https://safe-surf.ru/specialists/bulletins-nkcki/707158 · Security Note
- https://crushftp.com/crush10wiki/Wiki.jsp?page=Update · Vendor Advisory
- https://reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable · Patch