PoC-in-GitHub/2024/CVE-2024-4040.json
2025-01-15 15:32:14 +09:00

533 lines
No EOL
19 KiB
JSON

[
{
"id": 790656600,
"name": "CVE-2024-4040",
"full_name": "airbus-cert\/CVE-2024-4040",
"owner": {
"login": "airbus-cert",
"id": 26453405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4",
"html_url": "https:\/\/github.com\/airbus-cert",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/airbus-cert\/CVE-2024-4040",
"description": "Scanner for CVE-2024-4040",
"fork": false,
"created_at": "2024-04-23T09:31:29Z",
"updated_at": "2024-12-06T09:40:39Z",
"pushed_at": "2024-05-17T06:48:43Z",
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 47,
"score": 0,
"subscribers_count": 8
},
{
"id": 791624022,
"name": "CVE-2024-4040-Scanner",
"full_name": "tucommenceapousser\/CVE-2024-4040-Scanner",
"owner": {
"login": "tucommenceapousser",
"id": 129875733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
"html_url": "https:\/\/github.com\/tucommenceapousser",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-4040-Scanner",
"description": "Scanner of vulnerability on crushftp instance",
"fork": false,
"created_at": "2024-04-25T04:01:23Z",
"updated_at": "2024-05-19T22:49:33Z",
"pushed_at": "2024-04-25T04:31:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 791636172,
"name": "CVE-2024-4040",
"full_name": "rbih-boulanouar\/CVE-2024-4040",
"owner": {
"login": "rbih-boulanouar",
"id": 79673409,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79673409?v=4",
"html_url": "https:\/\/github.com\/rbih-boulanouar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rbih-boulanouar\/CVE-2024-4040",
"description": null,
"fork": false,
"created_at": "2024-04-25T04:45:38Z",
"updated_at": "2024-07-30T16:14:52Z",
"pushed_at": "2024-04-25T04:56:50Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
{
"id": 791645744,
"name": "CVE-2024-4040",
"full_name": "Mufti22\/CVE-2024-4040",
"owner": {
"login": "Mufti22",
"id": 75854478,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4",
"html_url": "https:\/\/github.com\/Mufti22",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mufti22\/CVE-2024-4040",
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
"fork": false,
"created_at": "2024-04-25T05:18:06Z",
"updated_at": "2024-06-21T00:12:21Z",
"pushed_at": "2024-04-25T05:21:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 792008958,
"name": "CVE-2024-4040-SSTI-LFI-PoC",
"full_name": "Stuub\/CVE-2024-4040-SSTI-LFI-PoC",
"owner": {
"login": "Stuub",
"id": 60468836,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
"html_url": "https:\/\/github.com\/Stuub",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Stuub\/CVE-2024-4040-SSTI-LFI-PoC",
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
"updated_at": "2024-12-15T22:44:40Z",
"pushed_at": "2024-07-07T23:47:58Z",
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"arbitrary-file-read",
"crushftp",
"crushftp0day",
"cve",
"cve-2024-4040",
"cve-2024-4040-exploit",
"cve-2024-4040-poc",
"cve2024-4040",
"lfi",
"owasp",
"python",
"rce",
"sftp"
],
"visibility": "public",
"forks": 7,
"watchers": 56,
"score": 0,
"subscribers_count": 2
},
{
"id": 793110572,
"name": "CVE-2024-4040",
"full_name": "0xN7y\/CVE-2024-4040",
"owner": {
"login": "0xN7y",
"id": 70061541,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70061541?v=4",
"html_url": "https:\/\/github.com\/0xN7y",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xN7y\/CVE-2024-4040",
"description": "exploit for CVE-2024-4040",
"fork": false,
"created_at": "2024-04-28T13:06:01Z",
"updated_at": "2024-10-23T13:17:06Z",
"pushed_at": "2024-04-28T13:06:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 793492567,
"name": "CVE-2024-4040-CrushFTP-server",
"full_name": "Praison001\/CVE-2024-4040-CrushFTP-server",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4040-CrushFTP-server",
"description": "Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms",
"fork": false,
"created_at": "2024-04-29T10:21:53Z",
"updated_at": "2024-04-29T10:27:07Z",
"pushed_at": "2024-04-29T10:27:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 794110110,
"name": "CVE-2024-4040",
"full_name": "Mohammaddvd\/CVE-2024-4040",
"owner": {
"login": "Mohammaddvd",
"id": 108727157,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108727157?v=4",
"html_url": "https:\/\/github.com\/Mohammaddvd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mohammaddvd\/CVE-2024-4040",
"description": "Exploit CrushFTP CVE-2024-4040",
"fork": false,
"created_at": "2024-04-30T13:27:34Z",
"updated_at": "2024-09-18T08:50:19Z",
"pushed_at": "2024-04-30T13:36:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 794593495,
"name": "CVE-2024-4040-CrushFTP-File-Read-vulnerability",
"full_name": "jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability",
"owner": {
"login": "jakabakos",
"id": 42498816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
"html_url": "https:\/\/github.com\/jakabakos",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability",
"description": null,
"fork": false,
"created_at": "2024-05-01T14:42:39Z",
"updated_at": "2024-06-06T11:58:36Z",
"pushed_at": "2024-05-02T09:58:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 795736659,
"name": "CVE-2024-4040",
"full_name": "gotr00t0day\/CVE-2024-4040",
"owner": {
"login": "gotr00t0day",
"id": 48636787,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48636787?v=4",
"html_url": "https:\/\/github.com\/gotr00t0day",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gotr00t0day\/CVE-2024-4040",
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
"fork": false,
"created_at": "2024-05-03T23:29:53Z",
"updated_at": "2024-12-06T09:40:40Z",
"pushed_at": "2024-05-04T00:05:16Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
{
"id": 800094876,
"name": "CVE-2024-4040",
"full_name": "1ncendium\/CVE-2024-4040",
"owner": {
"login": "1ncendium",
"id": 50025292,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50025292?v=4",
"html_url": "https:\/\/github.com\/1ncendium",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/1ncendium\/CVE-2024-4040",
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. ",
"fork": false,
"created_at": "2024-05-13T17:33:36Z",
"updated_at": "2024-05-13T17:33:41Z",
"pushed_at": "2024-05-13T17:33:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 821345624,
"name": "CVE-2024-4040",
"full_name": "olebris\/CVE-2024-4040",
"owner": {
"login": "olebris",
"id": 78493240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78493240?v=4",
"html_url": "https:\/\/github.com\/olebris",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/olebris\/CVE-2024-4040",
"description": "CVE-2024-4040 PoC",
"fork": false,
"created_at": "2024-06-28T10:32:51Z",
"updated_at": "2024-06-28T11:50:56Z",
"pushed_at": "2024-06-28T10:33:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824427234,
"name": "CVE-2024-4040",
"full_name": "entroychang\/CVE-2024-4040",
"owner": {
"login": "entroychang",
"id": 56551382,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56551382?v=4",
"html_url": "https:\/\/github.com\/entroychang",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/entroychang\/CVE-2024-4040",
"description": "CVE-2024-4040 PoC",
"fork": false,
"created_at": "2024-07-05T05:46:56Z",
"updated_at": "2024-12-06T09:40:42Z",
"pushed_at": "2024-07-09T09:48:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-4040",
"exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 859098985,
"name": "CrushFTP-cve-2024-4040-poc",
"full_name": "safeer-accuknox\/CrushFTP-cve-2024-4040-poc",
"owner": {
"login": "safeer-accuknox",
"id": 180378107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4",
"html_url": "https:\/\/github.com\/safeer-accuknox",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/safeer-accuknox\/CrushFTP-cve-2024-4040-poc",
"description": null,
"fork": false,
"created_at": "2024-09-18T04:45:54Z",
"updated_at": "2024-10-16T07:21:52Z",
"pushed_at": "2024-10-16T07:21:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 865497094,
"name": "GenCrushSSTIExploit",
"full_name": "geniuszly\/GenCrushSSTIExploit",
"owner": {
"login": "geniuszly",
"id": 137893386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
"html_url": "https:\/\/github.com\/geniuszly",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/geniuszly\/GenCrushSSTIExploit",
"description": "is a PoC for CVE-2024-4040 tool for exploiting the SSTI vulnerability in CrushFTP",
"fork": false,
"created_at": "2024-09-30T16:18:07Z",
"updated_at": "2024-11-20T16:31:06Z",
"pushed_at": "2024-09-30T16:19:24Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"crush",
"crush-ssti",
"cve",
"cve-2024-4040",
"cybersecurity",
"ethical-hacking",
"exploit",
"exploit-development",
"gencrushsstiexploit",
"penetration-testing",
"security",
"server-side-template-injection",
"ssti",
"vulnerability",
"web-security"
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 877132815,
"name": "CVE-2024-4040",
"full_name": "rahisec\/CVE-2024-4040",
"owner": {
"login": "rahisec",
"id": 35906436,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35906436?v=4",
"html_url": "https:\/\/github.com\/rahisec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rahisec\/CVE-2024-4040",
"description": null,
"fork": false,
"created_at": "2024-10-23T06:29:19Z",
"updated_at": "2024-10-23T06:31:12Z",
"pushed_at": "2024-10-23T06:31:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]