← Retour aux CVEs
CVE-2024-4040
CRITICALCISA KEV9.8
Description
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie4/22/2024
Derniere modification2/26/2026
Sourcekev
Observations honeypot0
CISA KEV
FournisseurCrushFTP
ProduitCrushFTP
Nom vulnerabiliteCrushFTP VFS Sandbox Escape Vulnerability
Date ajout KEV2024-04-24
Date limite remediation2024-05-01
Utilise dans ransomwareUnknown
Produits affectes
crushftp:crushftp
Faiblesses (CWE)
CWE-1336CWE-94
References
https://github.com/airbus-cert/CVE-2024-4040(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/(430a6cef-dc26-47e3-9fa8-52fb7f19644e)
https://github.com/airbus-cert/CVE-2024-4040(af854a3a-2127-422b-91ae-364da2661108)
https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/(af854a3a-2127-422b-91ae-364da2661108)
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update(af854a3a-2127-422b-91ae-364da2661108)
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update(af854a3a-2127-422b-91ae-364da2661108)
https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/(af854a3a-2127-422b-91ae-364da2661108)
https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/(af854a3a-2127-422b-91ae-364da2661108)
https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4040(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.