CrushFTP Authentication Bypass Vulnerability

漏洞信息

漏洞名称: CrushFTP Authentication Bypass Vulnerability

漏洞编号:

  • CVE: CVE-2024-4040

漏洞类型: 权限绕过

漏洞等级: 严重

漏洞描述: CrushFTP是一款广泛使用的文件传输协议服务器软件,支持多种协议如FTP、SFTP、HTTP等,常用于企业环境中进行文件共享和数据传输。由于其功能强大且易于部署,CrushFTP在多个行业中有广泛的应用。此次发现的漏洞CVE-2024-4040影响CrushFTP v10及以下版本,属于认证绕过漏洞。攻击者可以通过伪造特定的CrushAuth cookie和AWS风格的Authorization头来绕过认证机制,无需有效凭证即可访问内部网络功能。这种漏洞的技术根源在于服务器未能正确验证用户提供的认证信息,导致攻击者可以构造恶意请求绕过安全检查。由于该漏洞允许未授权访问,攻击者可以利用此漏洞获取敏感信息、执行未授权操作或进一步渗透网络。更为严重的是,该漏洞的利用无需用户交互,可以被自动化工具利用,大大增加了其危害性。因此,该漏洞被评定为严重级别,建议所有使用受影响版本的用户立即更新到官方发布的最新版本以修复此漏洞。

产品厂商: CrushFTP

产品名称: CrushFTP

影响版本: v10.x (prior to official patch)

来源: https://github.com/ill-deed/CrushFTP-CVE-2024-4040-illdeed

类型: CVE-2024:github search

仓库文件

  • CVE-2024-4040.py
  • LICENSE
  • README.md

来源概述

CVE-2024-4040 — CrushFTP Authentication Bypass Exploit

This repository contains a stealthy Python proof-of-concept (PoC) exploit for CVE-2024-4040, a critical vulnerability in CrushFTP (v10 and below) that allows an attacker to bypass authentication using a forged CrushAuth cookie and AWS-style Authorization header.

🚨 Vulnerability Summary

An unauthenticated attacker can bypass authentication in vulnerable CrushFTP instances by crafting a specific cookie/header combination, gaining unauthorized access to internal web functions.

  • CVE ID: CVE-2024-4040
  • Severity: Critical (CVSS 9.8)
  • Affected: CrushFTP v10.x (prior to official patch)

⚙️ Features

  • ✅ Python 3.x PoC
  • ✅ Secure CrushAuth generation using secrets
  • ✅ Valid AWS-style spoofed Authorization header
  • ✅ Built-in SSL bypass with suppression
  • ✅ No external dependencies (only requests)
  • ✅ Clean console output with status and detection

🛠 Usage

1
python3 CVE-2024-4040.py http://target-ip:8080 --valid_username crushadmin

target_url — Base URL of the CrushFTP server

--valid_username — Known valid user (default: crushadmin)


🔍 Example Output

1
2
3
4
5
6
7
8
9
10
[*] CrushFTP Authentication Bypass Exploit
[*] Targeting: http://192.168.1.10:8080
[*] Using username: crushadmin

[+] Exploit Result:

Status_Code : 200
Response_Text : {"getUserNameResponse":{"user_name":"crushadmin"}}

[+] CrushFTP Server is VULNERABLE!

This code is for educational and authorized security testing purposes only.
Do not use against systems you do not own or have explicit permission to test.


🙏 Credits

PoC Refactor: illdeed


CrushFTP Authentication Bypass Vulnerability
http://example.com/2025/07/04/github_3044363706/
作者
lianccc
发布于
2025年7月4日
许可协议