CVE Series: VFS Escape in CrushFTP (CVE-2024-4040)
CVE-2024-4040 is a critical vulnerability in CrushFTP, a Java-based robust file server. Rated with a CVSS score of 10, this flaw permits remote, unauthorized attackers to circumvent authentication mechanisms, thereby gaining remote code execution (or RCE). In this course you’ll explore, exploit, and remediate this CVE.

Course Content
Course Description
CVE-2024-4040 is a critical vulnerability in CrushFTP, a Java-based robust file server. Rated with a CVSS score of 10 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), this flaw permits remote, unauthorized attackers to circumvent authentication mechanisms, thereby gaining remote code execution (or RCE). Exploiting this vulnerability involves bypassing authentication, template upload, and ultimately local file inclusion (so, auth bypass, SSTI, and LFI to achieve RCE). Versions of CrushFTP prior to 11.1.0 and 10.7.1. The vulnerability's root cause is the SSTI resulting in VFS breakout and code execution. In this course you’ll explore, exploit, and remediate this CVE.
Target Audience
This course is for seasoned red teamers, penetration testers, security and vulnerability assessment analysts, and system administrators who want to know how to exploit and protect against the latest vulnerabilities impacting enterprise systems.
Course Level
Intermediate
Prerequisites
A basic understanding of the Linux command line, networking, and Python.
Helpful Links
- CVE Entry: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4040 (Official CVE)
- NIST Entry: https://nvd.nist.gov/vuln/detail/CVE-2024-4040
- Security Advisory: https://www.crushftp.com/crush11wiki/Wiki.jsp
- Attacker KB Analysis: https://attackerkb.com/topics/20oYjlmfXa/cve-2024-4040/rapid7-analysis
- Dark Reading: https://www.darkreading.com/cloud-security/patch-crushftp-zero-day-cloud-exploit-targets-us-orgs