关联漏洞
介绍
# Authentication Bypass by Primary Weakness CrushFTP (CVE-2025-31161)
## Overview
Authentication bypass vulnerability in CrushFTP versions 10.0.0 to 10.8.3 and 11.0.0 to 11.3.0. The vulnerability exists in the AWS4-HMAC authorization method of the HTTP component of the FTP server.
## Details
- **CVE ID**: [CVE-2025-31161](https://nvd.nist.gov/vuln/detail/CVE-2025-31161)
- **Discovered**: 2025-03-30
- **Published**: 2024-04-03
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
## Vulnerability Description
An unauthenticated attacker can : - Bypass authentication completely - Gain access to the crushadmin account - Fully compromise the CrushFTP server - Obtain administrative privileges - Potentially access, modify, or delete sensitive data - Take complete control of the affected system
## Affected Versions
**CrushFTP**
10.0.0 to 10.8.3 and 11.0.0 to 11.3.0.
## Running
To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```
## Exploit:
### [https://bit.ly/4id6jeT]
文件快照
[4.0K] /data/pocs/5745daf9210e40574c2eb9a89150a462fb94fc74
└── [1.0K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。