POC详情: e7da2299f818a1ddc48bdbcd7c0f02cb29a8cd0b

来源
关联漏洞
标题: CrushFTP 安全漏洞 (CVE-2025-2825)
描述:CrushFTP是CrushFTP公司的一款文件传输服务器。 CrushFTP 10.0.0至10.8.3版本和11.0.0至11.3.0版本存在安全漏洞,该漏洞源于可能导致未经验证的访问。
描述
Authentication Bypass PoC for CVE-2025-2825 – Exploiting CrushFTP 10.x
介绍
![CVE](https://img.shields.io/badge/CVE-2025--2825-red)
![Exploit-Status](https://img.shields.io/badge/status-exploitable-critical)

# 🚨 CVE-2025-2825 – CrushFTP Authentication Bypass

## 🔎 Overview

**CVE-2025-2825** is a critical authentication bypass vulnerability affecting **CrushFTP**, a widely used secure file transfer server. The flaw allows remote attackers to bypass login authentication and gain administrative access by spoofing headers — tricking the server into thinking the request came from localhost.

- **Severity:** Critical  
- **CVSS Score:** 9.8  
- **Attack Vector:** Remote  
- **Affected Versions:** CrushFTP < v10.6.0  
- **Fixed In:** v10.6.0 and above  
- **Status:** Under active exploitation in the wild  

---

## 🧠 Technical Details

The vulnerability arises due to improper validation of the `X-Forwarded-For` header. When this header is set to `127.0.0.1`, the server treats the request as local — bypassing authentication.

---

## 🧪 Proof of Concept (PoC)

### 🔸 HTTP Request Example:

```http
GET /WebInterface/login.html?command=validate&username=Admin&password=any HTTP/1.1  
Host: target-ip  
X-Forwarded-For: 127.0.0.1
```

> 📝 Replace `target-ip` with the actual IP address of the target CrushFTP server.

If successful, the server bypasses authentication and grants access — even with incorrect credentials.

---

## 🔗 PoC Python Script

[📄 cve-2025-2825-poc.py](./cve-2025-2825-poc.py)

---

## 🛠️ Tools & Technologies Used

- **Python** – scripting the exploit  
- **Burp Suite** – intercepting and modifying HTTP headers  
- **Wireshark** – packet capture and analysis  
- **Nmap** – port scanning and service enumeration  
- **CrushFTP** – vulnerable target instance  
- **GitHub** – for publishing PoC and documentation  

---

## 📝 Steps to Reproduce

1. Set up a vulnerable version of CrushFTP (v10.5 or earlier).
2. Intercept the login request using Burp Suite.
3. Modify the HTTP request header:
   ```
   X-Forwarded-For: 127.0.0.1
   ```
4. Forward the request.
5. Admin access is granted without valid credentials.

---

## ✅ Mitigation

- Upgrade to CrushFTP **v10.6.0** or higher.
- Sanitize and validate headers like `X-Forwarded-For`.
- Restrict admin access to localhost or behind a VPN/firewall.
- Monitor logs for suspicious access patterns.

---

## 👨‍💻 Author

**Shivshant Patil**  
Certified Ethical Hacker (CEH v13)  
B.Tech Computer Engineering Graduate  
🔗 [LinkedIn Profile](https://www.linkedin.com/in/shivshant-patil-b58aaa281)
🔗 [Github Profile](https://github.com/Shivshantp)

---

## 📚 References

- 🔗 [Official CrushFTP Security Advisory](#)
- 🔗 [NVD Entry - CVE-2025-2825](#)
- 🔗 [PacketStorm Security](#)

文件快照

[4.0K] /data/pocs/e7da2299f818a1ddc48bdbcd7c0f02cb29a8cd0b ├── [ 509] cve-2025-2825-poc.py └── [2.7K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。