PoC-in-GitHub/2024/CVE-2024-4040.json

287 lines
10 KiB
JSON
Raw Normal View History

2024-04-23 02:33:33 +02:00
[
{
2024-04-23 14:28:59 +02:00
"id": 790656600,
2024-04-23 02:33:33 +02:00
"name": "CVE-2024-4040",
2024-04-23 14:28:59 +02:00
"full_name": "airbus-cert\/CVE-2024-4040",
2024-04-23 02:33:33 +02:00
"owner": {
2024-04-23 14:28:59 +02:00
"login": "airbus-cert",
"id": 26453405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4",
"html_url": "https:\/\/github.com\/airbus-cert"
2024-04-23 02:33:33 +02:00
},
2024-04-23 14:28:59 +02:00
"html_url": "https:\/\/github.com\/airbus-cert\/CVE-2024-4040",
"description": "Scanner for CVE-2024-4040",
2024-04-23 02:33:33 +02:00
"fork": false,
2024-04-23 14:28:59 +02:00
"created_at": "2024-04-23T09:31:29Z",
2024-05-04 02:27:25 +02:00
"updated_at": "2024-05-03T21:19:03Z",
2024-04-23 14:28:59 +02:00
"pushed_at": "2024-04-23T09:45:57Z",
2024-05-04 02:27:25 +02:00
"stargazers_count": 42,
"watchers_count": 42,
2024-04-23 02:33:33 +02:00
"has_discussions": false,
2024-05-02 02:27:31 +02:00
"forks_count": 6,
2024-04-23 02:33:33 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-05-02 02:27:31 +02:00
"forks": 6,
2024-05-04 02:27:25 +02:00
"watchers": 42,
2024-04-24 02:34:30 +02:00
"score": 0,
2024-04-24 08:28:15 +02:00
"subscribers_count": 7
2024-04-24 02:34:30 +02:00
},
2024-04-25 08:28:47 +02:00
{
"id": 791624022,
"name": "CVE-2024-4040-Scanner",
"full_name": "tucommenceapousser\/CVE-2024-4040-Scanner",
"owner": {
"login": "tucommenceapousser",
"id": 129875733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
"html_url": "https:\/\/github.com\/tucommenceapousser"
},
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-4040-Scanner",
"description": "Scanner of vulnerability on crushftp instance",
"fork": false,
"created_at": "2024-04-25T04:01:23Z",
2024-04-30 08:28:15 +02:00
"updated_at": "2024-04-30T03:47:21Z",
2024-04-25 08:28:47 +02:00
"pushed_at": "2024-04-25T04:31:08Z",
2024-04-24 02:34:30 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2024-04-23 02:33:33 +02:00
"score": 0,
2024-04-26 08:28:34 +02:00
"subscribers_count": 1
2024-04-25 08:28:47 +02:00
},
{
"id": 791636172,
"name": "CVE-2024-4040",
"full_name": "rbih-boulanouar\/CVE-2024-4040",
"owner": {
"login": "rbih-boulanouar",
"id": 79673409,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79673409?v=4",
"html_url": "https:\/\/github.com\/rbih-boulanouar"
},
"html_url": "https:\/\/github.com\/rbih-boulanouar\/CVE-2024-4040",
"description": null,
"fork": false,
"created_at": "2024-04-25T04:45:38Z",
2024-04-29 20:38:44 +02:00
"updated_at": "2024-04-29T14:40:31Z",
2024-04-25 08:28:47 +02:00
"pushed_at": "2024-04-25T04:56:50Z",
2024-04-29 20:38:44 +02:00
"stargazers_count": 13,
"watchers_count": 13,
2024-04-25 08:28:47 +02:00
"has_discussions": false,
2024-04-25 20:28:56 +02:00
"forks_count": 2,
2024-04-25 08:28:47 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-04-25 20:28:56 +02:00
"forks": 2,
2024-04-29 20:38:44 +02:00
"watchers": 13,
2024-04-25 08:28:47 +02:00
"score": 0,
2024-04-26 08:28:34 +02:00
"subscribers_count": 1
2024-04-25 08:28:47 +02:00
},
{
"id": 791645744,
"name": "CVE-2024-4040",
"full_name": "Mufti22\/CVE-2024-4040",
"owner": {
"login": "Mufti22",
"id": 75854478,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4",
"html_url": "https:\/\/github.com\/Mufti22"
},
"html_url": "https:\/\/github.com\/Mufti22\/CVE-2024-4040",
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
"fork": false,
"created_at": "2024-04-25T05:18:06Z",
2024-04-28 08:27:59 +02:00
"updated_at": "2024-04-28T02:24:14Z",
2024-04-25 08:28:47 +02:00
"pushed_at": "2024-04-25T05:21:26Z",
2024-04-28 08:27:59 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2024-04-25 08:28:47 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-04-28 08:27:59 +02:00
"watchers": 1,
2024-04-25 08:28:47 +02:00
"score": 0,
2024-04-26 08:28:34 +02:00
"subscribers_count": 1
2024-04-26 02:27:56 +02:00
},
{
"id": 792008958,
2024-04-26 20:28:41 +02:00
"name": "CVE-2024-4040-SSTI-LFI-PoC",
"full_name": "Stuub\/CVE-2024-4040-SSTI-LFI-PoC",
2024-04-26 02:27:56 +02:00
"owner": {
"login": "Stuub",
"id": 60468836,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
"html_url": "https:\/\/github.com\/Stuub"
},
2024-04-26 20:28:41 +02:00
"html_url": "https:\/\/github.com\/Stuub\/CVE-2024-4040-SSTI-LFI-PoC",
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
2024-04-26 02:27:56 +02:00
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
2024-05-03 14:27:46 +02:00
"updated_at": "2024-05-03T10:32:25Z",
2024-04-29 08:30:41 +02:00
"pushed_at": "2024-04-29T00:59:40Z",
2024-05-03 14:27:46 +02:00
"stargazers_count": 14,
"watchers_count": 14,
2024-04-26 02:27:56 +02:00
"has_discussions": false,
2024-05-04 14:27:21 +02:00
"forks_count": 5,
2024-04-26 02:27:56 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
2024-04-26 20:28:41 +02:00
"0day",
2024-04-29 08:30:41 +02:00
"arbitrary-file-read",
2024-04-26 02:27:56 +02:00
"crushftp",
2024-04-29 08:30:41 +02:00
"crushftp0day",
2024-04-26 02:27:56 +02:00
"cve",
"cve-2024-4040",
2024-04-29 08:30:41 +02:00
"cve-2024-4040-exploit",
2024-04-26 20:28:41 +02:00
"cve-2024-4040-poc",
2024-04-26 02:27:56 +02:00
"cve2024-4040",
"lfi",
"owasp",
"python",
"rce",
"sftp"
],
"visibility": "public",
2024-05-04 14:27:21 +02:00
"forks": 5,
2024-05-03 14:27:46 +02:00
"watchers": 14,
2024-04-26 02:27:56 +02:00
"score": 0,
2024-04-26 08:28:34 +02:00
"subscribers_count": 1
2024-04-29 14:30:40 +02:00
},
{
"id": 793492567,
"name": "CVE-2024-4040-CrushFTP-server",
"full_name": "Praison001\/CVE-2024-4040-CrushFTP-server",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4040-CrushFTP-server",
"description": "Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms",
"fork": false,
"created_at": "2024-04-29T10:21:53Z",
"updated_at": "2024-04-29T10:27:07Z",
"pushed_at": "2024-04-29T10:27:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-04-30 08:28:15 +02:00
"subscribers_count": 1
2024-04-30 20:28:15 +02:00
},
{
"id": 794110110,
"name": "CVE-2024-4040",
"full_name": "Mohammaddvd\/CVE-2024-4040",
"owner": {
"login": "Mohammaddvd",
"id": 108727157,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108727157?v=4",
"html_url": "https:\/\/github.com\/Mohammaddvd"
},
"html_url": "https:\/\/github.com\/Mohammaddvd\/CVE-2024-4040",
"description": "Exploit CrushFTP CVE-2024-4040",
"fork": false,
"created_at": "2024-04-30T13:27:34Z",
"updated_at": "2024-04-30T13:47:22Z",
"pushed_at": "2024-04-30T13:36:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
2024-05-01 08:27:34 +02:00
"subscribers_count": 1
2024-05-01 20:28:18 +02:00
},
{
"id": 794593495,
"name": "CVE-2024-4040-CrushFTP-File-Read-vulnerability",
"full_name": "jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability",
"owner": {
"login": "jakabakos",
"id": 42498816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
"html_url": "https:\/\/github.com\/jakabakos"
},
"html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability",
"description": null,
"fork": false,
"created_at": "2024-05-01T14:42:39Z",
2024-05-03 14:27:46 +02:00
"updated_at": "2024-05-03T11:07:31Z",
2024-05-02 14:28:13 +02:00
"pushed_at": "2024-05-02T09:58:21Z",
2024-05-03 14:27:46 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2024-05-01 20:28:18 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-05-03 14:27:46 +02:00
"watchers": 2,
2024-05-01 20:28:18 +02:00
"score": 0,
2024-05-02 08:27:51 +02:00
"subscribers_count": 1
2024-05-04 02:27:25 +02:00
},
{
"id": 795736659,
"name": "CVE-2024-4040",
"full_name": "gotr00t0day\/CVE-2024-4040",
"owner": {
"login": "gotr00t0day",
"id": 48636787,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48636787?v=4",
"html_url": "https:\/\/github.com\/gotr00t0day"
},
"html_url": "https:\/\/github.com\/gotr00t0day\/CVE-2024-4040",
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
"fork": false,
"created_at": "2024-05-03T23:29:53Z",
2024-05-05 20:27:27 +02:00
"updated_at": "2024-05-05T17:50:45Z",
2024-05-04 02:27:25 +02:00
"pushed_at": "2024-05-04T00:05:16Z",
2024-05-05 20:27:27 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2024-05-04 02:27:25 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-05-05 20:27:27 +02:00
"watchers": 1,
2024-05-04 02:27:25 +02:00
"score": 0,
2024-05-04 08:27:23 +02:00
"subscribers_count": 1
2024-04-23 02:33:33 +02:00
}
]