CVE-2024-4040

Critical
|10.0
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows attackers to read files from the server, bypass authentication to gain admin access, and execute malicious code remotely. It affects all versions of CrushFTP before 10.7.1 and 11.1.0, and attackers do not need to be logged in to exploit it.

Technical Description

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$15,000($5K-$15K)
Vendor Response
Grade FPatched in 674 days

Quick Information

Published

Apr 22, 2024

almost 2 years ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

crushftp

Product

crushftp