PoC-in-GitHub/2024/CVE-2024-4040.json
2024-08-03 03:29:09 +09:00

381 lines
No EOL
14 KiB
JSON

[
{
"id": 790656600,
"name": "CVE-2024-4040",
"full_name": "airbus-cert\/CVE-2024-4040",
"owner": {
"login": "airbus-cert",
"id": 26453405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26453405?v=4",
"html_url": "https:\/\/github.com\/airbus-cert"
},
"html_url": "https:\/\/github.com\/airbus-cert\/CVE-2024-4040",
"description": "Scanner for CVE-2024-4040",
"fork": false,
"created_at": "2024-04-23T09:31:29Z",
"updated_at": "2024-07-31T12:18:30Z",
"pushed_at": "2024-05-17T06:48:43Z",
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 50,
"score": 0,
"subscribers_count": 8
},
{
"id": 791624022,
"name": "CVE-2024-4040-Scanner",
"full_name": "tucommenceapousser\/CVE-2024-4040-Scanner",
"owner": {
"login": "tucommenceapousser",
"id": 129875733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
"html_url": "https:\/\/github.com\/tucommenceapousser"
},
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2024-4040-Scanner",
"description": "Scanner of vulnerability on crushftp instance",
"fork": false,
"created_at": "2024-04-25T04:01:23Z",
"updated_at": "2024-05-19T22:49:33Z",
"pushed_at": "2024-04-25T04:31:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 791636172,
"name": "CVE-2024-4040",
"full_name": "rbih-boulanouar\/CVE-2024-4040",
"owner": {
"login": "rbih-boulanouar",
"id": 79673409,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79673409?v=4",
"html_url": "https:\/\/github.com\/rbih-boulanouar"
},
"html_url": "https:\/\/github.com\/rbih-boulanouar\/CVE-2024-4040",
"description": null,
"fork": false,
"created_at": "2024-04-25T04:45:38Z",
"updated_at": "2024-07-30T16:14:52Z",
"pushed_at": "2024-04-25T04:56:50Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
{
"id": 791645744,
"name": "CVE-2024-4040",
"full_name": "Mufti22\/CVE-2024-4040",
"owner": {
"login": "Mufti22",
"id": 75854478,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4",
"html_url": "https:\/\/github.com\/Mufti22"
},
"html_url": "https:\/\/github.com\/Mufti22\/CVE-2024-4040",
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
"fork": false,
"created_at": "2024-04-25T05:18:06Z",
"updated_at": "2024-06-21T00:12:21Z",
"pushed_at": "2024-04-25T05:21:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 792008958,
"name": "CVE-2024-4040-SSTI-LFI-PoC",
"full_name": "Stuub\/CVE-2024-4040-SSTI-LFI-PoC",
"owner": {
"login": "Stuub",
"id": 60468836,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
"html_url": "https:\/\/github.com\/Stuub"
},
"html_url": "https:\/\/github.com\/Stuub\/CVE-2024-4040-SSTI-LFI-PoC",
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
"updated_at": "2024-07-30T16:14:52Z",
"pushed_at": "2024-07-07T23:47:58Z",
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"arbitrary-file-read",
"crushftp",
"crushftp0day",
"cve",
"cve-2024-4040",
"cve-2024-4040-exploit",
"cve-2024-4040-poc",
"cve2024-4040",
"lfi",
"owasp",
"python",
"rce",
"sftp"
],
"visibility": "public",
"forks": 7,
"watchers": 52,
"score": 0,
"subscribers_count": 2
},
{
"id": 793492567,
"name": "CVE-2024-4040-CrushFTP-server",
"full_name": "Praison001\/CVE-2024-4040-CrushFTP-server",
"owner": {
"login": "Praison001",
"id": 60835238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60835238?v=4",
"html_url": "https:\/\/github.com\/Praison001"
},
"html_url": "https:\/\/github.com\/Praison001\/CVE-2024-4040-CrushFTP-server",
"description": "Exploit for CVE-2024-4040 affecting CrushFTP server in all versions before 10.7.1 and 11.1.0 on all platforms",
"fork": false,
"created_at": "2024-04-29T10:21:53Z",
"updated_at": "2024-04-29T10:27:07Z",
"pushed_at": "2024-04-29T10:27:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 794110110,
"name": "CVE-2024-4040",
"full_name": "Mohammaddvd\/CVE-2024-4040",
"owner": {
"login": "Mohammaddvd",
"id": 108727157,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108727157?v=4",
"html_url": "https:\/\/github.com\/Mohammaddvd"
},
"html_url": "https:\/\/github.com\/Mohammaddvd\/CVE-2024-4040",
"description": "Exploit CrushFTP CVE-2024-4040",
"fork": false,
"created_at": "2024-04-30T13:27:34Z",
"updated_at": "2024-05-13T03:54:08Z",
"pushed_at": "2024-04-30T13:36:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 794593495,
"name": "CVE-2024-4040-CrushFTP-File-Read-vulnerability",
"full_name": "jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability",
"owner": {
"login": "jakabakos",
"id": 42498816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
"html_url": "https:\/\/github.com\/jakabakos"
},
"html_url": "https:\/\/github.com\/jakabakos\/CVE-2024-4040-CrushFTP-File-Read-vulnerability",
"description": null,
"fork": false,
"created_at": "2024-05-01T14:42:39Z",
"updated_at": "2024-06-06T11:58:36Z",
"pushed_at": "2024-05-02T09:58:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 795736659,
"name": "CVE-2024-4040",
"full_name": "gotr00t0day\/CVE-2024-4040",
"owner": {
"login": "gotr00t0day",
"id": 48636787,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48636787?v=4",
"html_url": "https:\/\/github.com\/gotr00t0day"
},
"html_url": "https:\/\/github.com\/gotr00t0day\/CVE-2024-4040",
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.",
"fork": false,
"created_at": "2024-05-03T23:29:53Z",
"updated_at": "2024-07-26T10:21:33Z",
"pushed_at": "2024-05-04T00:05:16Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 800094876,
"name": "CVE-2024-4040",
"full_name": "1ncendium\/CVE-2024-4040",
"owner": {
"login": "1ncendium",
"id": 50025292,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50025292?v=4",
"html_url": "https:\/\/github.com\/1ncendium"
},
"html_url": "https:\/\/github.com\/1ncendium\/CVE-2024-4040",
"description": "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. ",
"fork": false,
"created_at": "2024-05-13T17:33:36Z",
"updated_at": "2024-05-13T17:33:41Z",
"pushed_at": "2024-05-13T17:33:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 821345624,
"name": "CVE-2024-4040",
"full_name": "olebris\/CVE-2024-4040",
"owner": {
"login": "olebris",
"id": 78493240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78493240?v=4",
"html_url": "https:\/\/github.com\/olebris"
},
"html_url": "https:\/\/github.com\/olebris\/CVE-2024-4040",
"description": "CVE-2024-4040 PoC",
"fork": false,
"created_at": "2024-06-28T10:32:51Z",
"updated_at": "2024-06-28T11:50:56Z",
"pushed_at": "2024-06-28T10:33:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824427234,
"name": "CVE-2024-4040",
"full_name": "entroychang\/CVE-2024-4040",
"owner": {
"login": "entroychang",
"id": 56551382,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56551382?v=4",
"html_url": "https:\/\/github.com\/entroychang"
},
"html_url": "https:\/\/github.com\/entroychang\/CVE-2024-4040",
"description": "CVE-2024-4040 PoC",
"fork": false,
"created_at": "2024-07-05T05:46:56Z",
"updated_at": "2024-07-31T07:00:05Z",
"pushed_at": "2024-07-09T09:48:17Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-4040",
"exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]