高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | Scanner for CVE-2024-4040 | https://github.com/airbus-cert/CVE-2024-4040 | POC詳細 |
| 2 | CVE-2024-4040 (CrushFTP VFS escape) or (CrushFTP unauthenticated RCE) | https://github.com/tr4c3rs/CVE-2024-4040-RCE-POC | POC詳細 |
| 3 | Scanner of vulnerability on crushftp instance | https://github.com/tucommenceapousser/CVE-2024-4040-Scanner | POC詳細 |
| 4 | None | https://github.com/rbih-boulanouar/CVE-2024-4040 | POC詳細 |
| 5 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | https://github.com/Mufti22/CVE-2024-4040 | POC詳細 |
| 6 | CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support | https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC | POC詳細 |
| 7 | Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms | https://github.com/Praison001/CVE-2024-4040-CrushFTP-server | POC詳細 |
| 8 | Exploit CrushFTP CVE-2024-4040 | https://github.com/Mohammaddvd/CVE-2024-4040 | POC詳細 |
| 9 | None | https://github.com/jakabakos/CVE-2024-4040-CrushFTP-File-Read-vulnerability | POC詳細 |
| 10 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | https://github.com/gotr00t0day/CVE-2024-4040 | POC詳細 |
| 11 | A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. | https://github.com/1ncendium/CVE-2024-4040 | POC詳細 |
| 12 | CVE-2024-4040 PoC | https://github.com/olebris/CVE-2024-4040 | POC詳細 |
| 13 | CVE-2024-4040 PoC | https://github.com/entroychang/CVE-2024-4040 | POC詳細 |
| 14 | None | https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc | POC詳細 |
| 15 | is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP | https://github.com/geniuszlyy/GenCrushSSTIExploit | POC詳細 |
| 16 | None | https://github.com/rahisec/CVE-2024-4040 | POC詳細 |
| 17 | exploit for CVE-2024-4040 | https://github.com/0xN7y/CVE-2024-4040 | POC詳細 |
| 18 | is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP | https://github.com/geniuszly/GenCrushSSTIExploit | POC詳細 |
| 19 | VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4040.yaml | POC詳細 |
| 20 | Exploit for CVE-2024-4040 – Authentication bypass in CrushFTP via CrushAuth cookie and AWS-style header spoofing. Stealthy Python PoC with secure token generation, SSL bypass, and improved output. | https://github.com/ill-deed/CrushFTP-CVE-2024-4040-illdeed | POC詳細 |
| 21 | A Dockerized setup for running a vulnerable CrushFTP 10 server instance (CVE-2024-4040). | https://github.com/juanorts/CrushFTP10-Docker-CVE-2024-4040 | POC詳細 |
| 22 | Exploit CrushFTP CVE-2024-4040 | https://github.com/dhammerg/CVE-2024-4040 | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成まだコメントはありません