关联漏洞
描述
Scanner for CVE-2024-4040
介绍
# CVE-2024-4040 - exploit scanners
This repository contains files related to [CVE-2024-4040](https://nvd.nist.gov/vuln/detail/CVE-2024-4040) (CrushFTP VFS escape).
## scan_host.py
This script attempts to use the vulnerability to read files outside the sandbox. If it succeeds, the script writes `Vulnerable` to standard output and returns with exit code 1. If exploiting the vulnerability does not succeed, the script writes `Not vulnerable` and exits with status code 0.
The script depends on the [`requests`](https://requests.readthedocs.io/en/latest/) library.
## scan_logs.py
This script looks for indicators of compromise in a CrushFTP server installation directory. It is basically equivalent to running the following command:
```
$ grep -F -r '<INCLUDE>' /path/to/CrushFTP/logs/
```
For each match, it will attempt to extract the IP which tried to exploit the server.
文件快照
[4.0K] /data/pocs/22a7e5752ecedfa26e4b139bd2053118a81b09a4
├── [ 883] README.md
├── [2.4K] scan_host.py
├── [1.4K] scan_logs.ps1
└── [1.3K] scan_logs.py
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。