CVE-2024-4040

CRITICAL KEV RANSOMWARE NUCLEI LAB

CrushFTP <10.7.1-11.1.0 - RCE

Title source: llm

Description

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

Exploits (22)

nomisec WORKING POC 60 stars
by Stuub · infoleak
https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC
nomisec SCANNER 51 stars
by airbus-cert · infoleak
https://github.com/airbus-cert/CVE-2024-4040
nomisec WORKING POC 13 stars
by rbih-boulanouar · infoleak
https://github.com/rbih-boulanouar/CVE-2024-4040
nomisec WORKING POC 8 stars
by geniuszly · infoleak
https://github.com/geniuszly/GenCrushSSTIExploit
nomisec SCANNER 5 stars
by gotr00t0day · infoleak
https://github.com/gotr00t0day/CVE-2024-4040
nomisec WORKING POC 5 stars
by dhammerg · poc
https://github.com/dhammerg/CVE-2024-4040
nomisec WORKING POC 3 stars
by entroychang · remote
https://github.com/entroychang/CVE-2024-4040
nomisec WORKING POC 3 stars
by jakabakos · infoleak
https://github.com/jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability
github SCANNER 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2024/CVE-2024-4040
nomisec SCANNER 1 stars
by tucommenceapousser · poc
https://github.com/tucommenceapousser/CVE-2024-4040-Scanner
gitlab SCANNER
by mdelaclaire · poc
https://gitlab.com/mdelaclaire/CVE-2024-4040-Scanner
nomisec WORKING POC
by juanorts · poc
https://github.com/juanorts/CrushFTP10-Docker-CVE-2024-4040
nomisec WORKING POC
by ill-deed · remote
https://github.com/ill-deed/CrushFTP-CVE-2024-4040-illdeed
nomisec SCANNER
by rahisec · infoleak
https://github.com/rahisec/CVE-2024-4040
nomisec WORKING POC
by safeer-accuknox · remote
https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc
nomisec SCANNER
by olebris · infoleak
https://github.com/olebris/CVE-2024-4040
nomisec WORKING POC
by 1ncendium · infoleak
https://github.com/1ncendium/CVE-2024-4040
nomisec WORKING POC
by Praison001 · infoleak
https://github.com/Praison001/CVE-2024-4040-CrushFTP-server
nomisec STUB
by 0xN7y · poc
https://github.com/0xN7y/CVE-2024-4040
nomisec WORKING POC
by Mufti22 · infoleak
https://github.com/Mufti22/CVE-2024-4040
vulncheck_xdb WORKING POC
remote
https://github.com/Mohammaddvd/CVE-2024-4040
metasploit WORKING POC
by remmons-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/crushftp_fileread_cve_2024_4040.rb

Nuclei Templates (1)

CrushFTP VFS - Sandbox Escape LFR
CRITICALVERIFIEDby DhiyaneshDK,pussycat0x
Shodan: html:"CrushFTP" || http.html:"crushftp"
FOFA: body="crushftp"

Scores

CVSS v3 9.8
EPSS 0.9443
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2024-04-24
VulnCheck KEV 2024-04-19
InTheWild.io 2024-04-24
ENISA EUVD EUVD-2024-32605
Ransomware Use Confirmed
CWE
CWE-1336 CWE-94
Status published
Products (1)
crushftp/crushftp 10.0.0 - 10.7.1
Published Apr 22, 2024
KEV Added Apr 24, 2024
Tracked Since Feb 18, 2026