At line 1 changed 2 lines |
__April 19th, 2024\\ |
CrushFTP v11 versions below 11.1 have a vulnerability where users can escape their VFS and download system files. This has been patched in v11.1.0. Customers using a [DMZ] in front of their main CrushFTP instance are protected with its protocol translation system it utilizes. (CREDIT:Simon Garrelou, of Airbus CERT)__\\ |
!!!__Update Bug on Windows__ |
Some versions of CrushFTP had a problem applying an update automatically. They would fail to rename ".jar" files on Windows operating systems. They would instead leave behind ".jar_tmp" files needing the "_tmp" manually removed from them. This has been fixed for a while, but if you are still on one of these older builds, you will be affected the next time you attempt the update. So you need to fix the jar filenames one time manually. Example: CrushFTP.jar_tmp -> CrushFTP.jar. Same for all other jars in plugins, plugins/lib folder, and the WebInterface folder has CrushTunnel.jar. Do all 3 locations entirely. |
At line 4 added 13 lines |
\\ |
!!Vulnerability Info |
__November 11th, 2024 - (CVE - coming soon...pending)\\ |
V10 versions below 10.8.3 and V11 versions below 11.2.3 are vulnerable to a password reset email exploit. If an end user clicks the link, their account is compromised. |
(CREDIT: Stratascale Cyber Research Unit)__\\ |
Once you update you must configure your allowed email reset URL domains.\\ |
v10:Preferences, WebInterface, MiniURL: Set an allowed list of domains, comma separated.\\ |
v11:Preferneces, WebInterface, Login Page: Set a domain pattern that is not just '*' as a '*' is no longer allowed.\\ |
---- |
April 19th, 2024 - CVE-2024-4040\\ |
CrushFTP v11 versions below 11.1 have a vulnerability where users can escape their VFS and download system files. This has been patched in v11.1.0. Customers using a [DMZ] in front of their main CrushFTP instance are partially protected with its protocol translation system it utilizes. A DMZ however does not fully protect you and you must update immediately. (CREDIT:Simon Garrelou, of Airbus CERT)\\ |
---- |
\\ |
At line 5 changed 5 lines |
•If I'm on v10.7.1...do I need to upgrade to v11? No, just update v10 to v10.7.1.\\ |
•If I'm on v10.6.1, or v10.3, or v10.5.5, am I vulnerable? Yes! Update immediately to 10.7.1.\\ |
•Can you tell me how I can check if I have been exploited? Not really..the nature of this was common words that could be in your log already. So there is no silver bullet search term to check for. Possibly looking for "paths=%3CINCLUDE" might be an indicator.\\ |
•If I have a DMZ am I really safe? Sort of...the attacker could steal files from the DMZ, but the DMZ shouldn't have files...no users, no private keys, no data files, etc...still some OS files, but there shouldn't be anything of real interest.\\ |
•If I only have my SFTP port exposed to the internet but not any web ports...am I safe? Yes, this exploit specifically works with the WebInterface port.\\ |
•If I'm on v10.8.3+...do I need to upgrade to v11? No, 10.8.3+ are safe.\\ |
•If I'm on v10.6.1, or v10.3, or v10.5.5, am I vulnerable? Yes! Update immediately to 10.8.3+ or v11.2.3+.\\ |
At line 25 changed one line |
2.) Give it the specific name `CrushFTP10_new.zip` and place this in the CrushFTP main folder. (Same location where you have your prefs.XML file)\\ |
2.) Give it the specific name `CrushFTP11_new.zip` and place this in the CrushFTP main folder. (Same location where you have your CrushFTP.jar file)\\ |