CVE-2024-4040

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
References
Link Resource
https://github.com/airbus-cert/CVE-2024-4040 Exploit Third Party Advisory
https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/ Press/Media Coverage Third Party Advisory
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update Patch Vendor Advisory
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update Patch Vendor Advisory
https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/ Third Party Advisory
https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/ Exploit Issue Tracking
https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/ Issue Tracking Patch
https://github.com/airbus-cert/CVE-2024-4040 Exploit Third Party Advisory
https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/ Press/Media Coverage Third Party Advisory
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update Patch Vendor Advisory
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update Patch Vendor Advisory
https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/ Third Party Advisory
https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/ Exploit Issue Tracking
https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/ Issue Tracking Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*

History

27 Jan 2025, 21:48

Type Values Removed Values Added
References () https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update - Vendor Advisory () https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update - Patch, Vendor Advisory
References () https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/ - Press/Media Coverage, Third Party Advisory () https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/ - Exploit, Issue Tracking
References () https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/ - Patch, Press/Media Coverage, Third Party Advisory () https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/ - Issue Tracking, Patch

Information

Published : 2024-04-22 20:15

Updated : 2025-01-27 21:48


NVD link : CVE-2024-4040

Mitre link : CVE-2024-4040

CVE.ORG link : CVE-2024-4040


JSON object : View

Products Affected

crushftp

  • crushftp
CWE
CWE-1336

Improper Neutralization of Special Elements Used in a Template Engine

CWE-94

Improper Control of Generation of Code ('Code Injection')