2025-01-08 01:32:44 +01:00
[
{
"id" : 790656600 ,
"name" : "CVE-2024-4040" ,
"full_name" : "airbus-cert\/CVE-2024-4040" ,
"owner" : {
"login" : "airbus-cert" ,
"id" : 26453405 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4" ,
"html_url" : "https:\/\/github.com\/airbus-cert" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/airbus-cert\/CVE-2024-4040" ,
"description" : "Scanner for CVE-2024-4040" ,
"fork" : false ,
"created_at" : "2024-04-23T09:31:29Z" ,
"updated_at" : "2024-12-06T09:40:39Z" ,
"pushed_at" : "2024-05-17T06:48:43Z" ,
"stargazers_count" : 47 ,
"watchers_count" : 47 ,
"has_discussions" : false ,
"forks_count" : 8 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 8 ,
"watchers" : 47 ,
"score" : 0 ,
"subscribers_count" : 8
} ,
{
"id" : 791624022 ,
"name" : "CVE-2024-4040-Scanner" ,
"full_name" : "tucommenceapousser\/CVE-2024-4040-Scanner" ,
"owner" : {
"login" : "tucommenceapousser" ,
"id" : 129875733 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4" ,
"html_url" : "https:\/\/github.com\/tucommenceapousser" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/tucommenceapousser\/CVE-2024-4040-Scanner" ,
"description" : "Scanner of vulnerability on crushftp instance" ,
"fork" : false ,
"created_at" : "2024-04-25T04:01:23Z" ,
"updated_at" : "2024-05-19T22:49:33Z" ,
"pushed_at" : "2024-04-25T04:31:08Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 791636172 ,
"name" : "CVE-2024-4040" ,
"full_name" : "rbih-boulanouar\/CVE-2024-4040" ,
"owner" : {
"login" : "rbih-boulanouar" ,
"id" : 79673409 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79673409?v=4" ,
"html_url" : "https:\/\/github.com\/rbih-boulanouar" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/rbih-boulanouar\/CVE-2024-4040" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-04-25T04:45:38Z" ,
"updated_at" : "2024-07-30T16:14:52Z" ,
"pushed_at" : "2024-04-25T04:56:50Z" ,
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 13 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 791645744 ,
"name" : "CVE-2024-4040" ,
"full_name" : "Mufti22\/CVE-2024-4040" ,
"owner" : {
"login" : "Mufti22" ,
"id" : 75854478 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4" ,
"html_url" : "https:\/\/github.com\/Mufti22" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Mufti22\/CVE-2024-4040" ,
"description" : "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server." ,
"fork" : false ,
"created_at" : "2024-04-25T05:18:06Z" ,
"updated_at" : "2024-06-21T00:12:21Z" ,
"pushed_at" : "2024-04-25T05:21:26Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 792008958 ,
"name" : "CVE-2024-4040-SSTI-LFI-PoC" ,
"full_name" : "Stuub\/CVE-2024-4040-SSTI-LFI-PoC" ,
"owner" : {
"login" : "Stuub" ,
"id" : 60468836 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4" ,
"html_url" : "https:\/\/github.com\/Stuub" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Stuub\/CVE-2024-4040-SSTI-LFI-PoC" ,
"description" : "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support" ,
"fork" : false ,
"created_at" : "2024-04-25T19:51:38Z" ,
"updated_at" : "2024-12-15T22:44:40Z" ,
"pushed_at" : "2024-07-07T23:47:58Z" ,
"stargazers_count" : 56 ,
"watchers_count" : 56 ,
"has_discussions" : false ,
"forks_count" : 7 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"0day" ,
"arbitrary-file-read" ,
"crushftp" ,
"crushftp0day" ,
"cve" ,
"cve-2024-4040" ,
"cve-2024-4040-exploit" ,
"cve-2024-4040-poc" ,
"cve2024-4040" ,
"lfi" ,
"owasp" ,
"python" ,
"rce" ,
"sftp"
] ,
"visibility" : "public" ,
"forks" : 7 ,
"watchers" : 56 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 793110572 ,
"name" : "CVE-2024-4040" ,
"full_name" : "0xN7y\/CVE-2024-4040" ,
"owner" : {
"login" : "0xN7y" ,
"id" : 70061541 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70061541?v=4" ,
"html_url" : "https:\/\/github.com\/0xN7y" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/0xN7y\/CVE-2024-4040" ,
"description" : "exploit for CVE-2024-4040" ,
"fork" : false ,
"created_at" : "2024-04-28T13:06:01Z" ,
"updated_at" : "2024-10-23T13:17:06Z" ,
"pushed_at" : "2024-04-28T13:06:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 793492567 ,
"name" : "CVE-2024-4040-CrushFTP-server" ,
"full_name" : "Praison001\/CVE-2024-4040-CrushFTP-server" ,
"owner" : {
"login" : "Praison001" ,
"id" : 60835238 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4" ,
"html_url" : "https:\/\/github.com\/Praison001" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Praison001\/CVE-2024-4040-CrushFTP-server" ,
"description" : "Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms" ,
"fork" : false ,
"created_at" : "2024-04-29T10:21:53Z" ,
"updated_at" : "2024-04-29T10:27:07Z" ,
"pushed_at" : "2024-04-29T10:27:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 794110110 ,
"name" : "CVE-2024-4040" ,
"full_name" : "Mohammaddvd\/CVE-2024-4040" ,
"owner" : {
"login" : "Mohammaddvd" ,
"id" : 108727157 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/108727157?v=4" ,
"html_url" : "https:\/\/github.com\/Mohammaddvd" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Mohammaddvd\/CVE-2024-4040" ,
"description" : "Exploit CrushFTP CVE-2024-4040" ,
"fork" : false ,
"created_at" : "2024-04-30T13:27:34Z" ,
"updated_at" : "2024-09-18T08:50:19Z" ,
"pushed_at" : "2024-04-30T13:36:33Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 794593495 ,
"name" : "CVE-2024-4040-CrushFTP-File-Read-vulnerability" ,
"full_name" : "jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability" ,
"owner" : {
"login" : "jakabakos" ,
"id" : 42498816 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4" ,
"html_url" : "https:\/\/github.com\/jakabakos" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-05-01T14:42:39Z" ,
"updated_at" : "2024-06-06T11:58:36Z" ,
"pushed_at" : "2024-05-02T09:58:21Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 795736659 ,
"name" : "CVE-2024-4040" ,
"full_name" : "gotr00t0day\/CVE-2024-4040" ,
"owner" : {
"login" : "gotr00t0day" ,
"id" : 48636787 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48636787?v=4" ,
"html_url" : "https:\/\/github.com\/gotr00t0day" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/gotr00t0day\/CVE-2024-4040" ,
"description" : "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server." ,
"fork" : false ,
"created_at" : "2024-05-03T23:29:53Z" ,
"updated_at" : "2024-12-06T09:40:40Z" ,
"pushed_at" : "2024-05-04T00:05:16Z" ,
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 10 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 800094876 ,
"name" : "CVE-2024-4040" ,
"full_name" : "1ncendium\/CVE-2024-4040" ,
"owner" : {
"login" : "1ncendium" ,
"id" : 50025292 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50025292?v=4" ,
"html_url" : "https:\/\/github.com\/1ncendium" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/1ncendium\/CVE-2024-4040" ,
"description" : "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. " ,
"fork" : false ,
"created_at" : "2024-05-13T17:33:36Z" ,
"updated_at" : "2024-05-13T17:33:41Z" ,
"pushed_at" : "2024-05-13T17:33:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 821345624 ,
"name" : "CVE-2024-4040" ,
"full_name" : "olebris\/CVE-2024-4040" ,
"owner" : {
"login" : "olebris" ,
"id" : 78493240 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/78493240?v=4" ,
"html_url" : "https:\/\/github.com\/olebris" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/olebris\/CVE-2024-4040" ,
"description" : "CVE-2024-4040 PoC" ,
"fork" : false ,
"created_at" : "2024-06-28T10:32:51Z" ,
"updated_at" : "2024-06-28T11:50:56Z" ,
"pushed_at" : "2024-06-28T10:33:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2025-01-15 07:32:14 +01:00
{
"id" : 824427234 ,
"name" : "CVE-2024-4040" ,
"full_name" : "entroychang\/CVE-2024-4040" ,
"owner" : {
"login" : "entroychang" ,
"id" : 56551382 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56551382?v=4" ,
"html_url" : "https:\/\/github.com\/entroychang" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/entroychang\/CVE-2024-4040" ,
"description" : "CVE-2024-4040 PoC" ,
"fork" : false ,
"created_at" : "2024-07-05T05:46:56Z" ,
"updated_at" : "2024-12-06T09:40:42Z" ,
"pushed_at" : "2024-07-09T09:48:17Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2024-4040" ,
"exploit"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2025-01-08 01:32:44 +01:00
{
"id" : 859098985 ,
"name" : "CrushFTP-cve-2024-4040-poc" ,
"full_name" : "safeer-accuknox\/CrushFTP-cve-2024-4040-poc" ,
"owner" : {
"login" : "safeer-accuknox" ,
"id" : 180378107 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4" ,
"html_url" : "https:\/\/github.com\/safeer-accuknox" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/safeer-accuknox\/CrushFTP-cve-2024-4040-poc" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-09-18T04:45:54Z" ,
"updated_at" : "2024-10-16T07:21:52Z" ,
"pushed_at" : "2024-10-16T07:21:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 865497094 ,
"name" : "GenCrushSSTIExploit" ,
"full_name" : "geniuszly\/GenCrushSSTIExploit" ,
"owner" : {
"login" : "geniuszly" ,
"id" : 137893386 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4" ,
"html_url" : "https:\/\/github.com\/geniuszly" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/geniuszly\/GenCrushSSTIExploit" ,
"description" : "is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP" ,
"fork" : false ,
"created_at" : "2024-09-30T16:18:07Z" ,
"updated_at" : "2024-11-20T16:31:06Z" ,
"pushed_at" : "2024-09-30T16:19:24Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"crush" ,
"crush-ssti" ,
"cve" ,
"cve-2024-4040" ,
"cybersecurity" ,
"ethical-hacking" ,
"exploit" ,
"exploit-development" ,
"gencrushsstiexploit" ,
"penetration-testing" ,
"security" ,
"server-side-template-injection" ,
"ssti" ,
"vulnerability" ,
"web-security"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 7 ,
"score" : 0 ,
"subscribers_count" : 1
2025-01-15 07:32:14 +01:00
} ,
{
"id" : 877132815 ,
"name" : "CVE-2024-4040" ,
"full_name" : "rahisec\/CVE-2024-4040" ,
"owner" : {
"login" : "rahisec" ,
"id" : 35906436 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35906436?v=4" ,
"html_url" : "https:\/\/github.com\/rahisec" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/rahisec\/CVE-2024-4040" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-10-23T06:29:19Z" ,
"updated_at" : "2024-10-23T06:31:12Z" ,
"pushed_at" : "2024-10-23T06:31:09Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
2025-01-08 01:32:44 +01:00
}
]