Skip to content

Latest commit

 

History

History
19 lines (11 loc) · 883 Bytes

README.md

File metadata and controls

19 lines (11 loc) · 883 Bytes

CVE-2024-4040 - exploit scanners

This repository contains files related to CVE-2024-4040 (CrushFTP VFS escape).

scan_host.py

This script attempts to use the vulnerability to read files outside the sandbox. If it succeeds, the script writes Vulnerable to standard output and returns with exit code 1. If exploiting the vulnerability does not succeed, the script writes Not vulnerable and exits with status code 0.

The script depends on the requests library.

scan_logs.py

This script looks for indicators of compromise in a CrushFTP server installation directory. It is basically equivalent to running the following command:

$ grep -F -r '<INCLUDE>' /path/to/CrushFTP/logs/

For each match, it will attempt to extract the IP which tried to exploit the server.