CVE-2024-4040
📋 TL;DR
CVE-2024-4040 is a critical server-side template injection vulnerability in CrushFTP that allows unauthenticated attackers to read files outside the sandbox, bypass authentication to gain admin access, and execute arbitrary code. All CrushFTP versions before 10.7.1 and 11.1.0 are affected across all platforms. This enables complete server compromise without requiring any authentication.
💻 Affected Systems
- CrushFTP
📦 What is this software?
Crushftp by Crushftp
Crushftp by Crushftp
⚠️ Risk & Real-World Impact
Worst Case
Complete server takeover with administrative privileges, data exfiltration, lateral movement, and persistent backdoor installation.
Likely Case
Unauthenticated remote code execution leading to data theft, ransomware deployment, or server compromise.
If Mitigated
Limited impact if patched immediately and proper network segmentation is in place.
🎯 Exploit Status
Public exploit code available, actively exploited in the wild. Attack requires no authentication and minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.7.1 or 11.1.0
Vendor Advisory: https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
Restart Required: Yes
Instructions:
1. Download latest version from CrushFTP website. 2. Stop CrushFTP service. 3. Install update. 4. Restart service. 5. Verify version is 10.7.1+ or 11.1.0+.
🔧 Temporary Workarounds
Network Isolation
linuxRestrict network access to CrushFTP servers using firewall rules
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP
Disable Web Interface
allTemporarily disable web interface if not required
Edit CrushFTP config to disable web server
🧯 If You Can't Patch
- Immediately isolate affected servers from internet and restrict internal network access
- Implement strict network monitoring and IDS/IPS rules to detect exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check CrushFTP version in admin interface or via systemctl status crushftp
Check Version:
grep 'CrushFTP Version' /path/to/crushftp/logs/server.log | tail -1
Verify Fix Applied:
Verify version shows 10.7.1 or higher for v10, or 11.1.0 or higher for v11
📡 Detection & Monitoring
Log Indicators:
- Unusual template processing errors
- Unauthenticated admin login attempts
- File read operations outside VFS
Network Indicators:
- HTTP requests with template injection payloads
- Unauthenticated requests to admin endpoints
SIEM Query:
source="crushftp.logs" AND ("template" OR "sandbox" OR "unauth")
🔗 References
- https://github.com/airbus-cert/CVE-2024-4040
- https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
- https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
- https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update
- https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/
- https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/
- https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/
- https://github.com/airbus-cert/CVE-2024-4040
- https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
- https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
- https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update
- https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/
- https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/
- https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4040