11 results (0.034 seconds)

CVSS: 10.0EPSS: 15%CPEs: 2EXPL: 3

26 Mar 2025 — CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability that may result in unauthenticated access. Remote and unauthenticated HTTP requests to CrushFTP may allow attackers to gain unauthorized access. CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability in the S3 authorization header processing that allows authentication bypass. Remote and unauthenticated HTTP requests to CrushFTP with known usernames can be used to imper... • https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

13 Dec 2024 — Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, resulting in Stored XSS or 'Cross-Site Scripting'. • https://crushftp.com/crush11wiki/Wiki.jsp?page=Update • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 94%CPEs: 2EXPL: 18

22 Apr 2024 — A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. VFS Sandbox Escape en CrushFTP en todas las versiones anteriores a 10.7.1 y 11.1.0 en todas las plataformas permite a atacantes remotos con privilegios bajos leer archivos del sistema de arch... • https://packetstorm.news/files/id/180590 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine •

CVSS: 5.9EPSS: 67%CPEs: 79EXPL: 3

18 Dec 2023 — The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phas... • https://packetstorm.news/files/id/176280 • CWE-222: Truncation of Security-relevant Information CWE-354: Improper Validation of Integrity Check Value •

CVSS: 10.0EPSS: 89%CPEs: 1EXPL: 3

17 Nov 2023 — CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes. CrushFTP anterior a 10.5.1 es vulnerable a modificaciones controladas incorrectamente de atributos de objetos determinados dinámicamente. • https://packetstorm.news/files/id/178067 • CWE-913: Improper Control of Dynamically-Managed Code Resources •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

15 Sep 2022 — An issue was discovered in CrushFTP 9. The creation of a new user through the /WebInterface/UserManager/ interface allows an attacker, with access to the administration panel, to perform Stored Cross-Site Scripting (XSS). The payload can be executed in multiple scenarios, for example when the user's page appears in the Most Visited section of the page. Se ha detectado un problema en CrushFTP 9. La creación de un nuevo usuario mediante la interfaz /WebInterface/UserManager/ permite a un atacante, con acceso ... • https://labs.nettitude.com/blog/cve-2021-44076-cross-site-scripting-xss-in-crushftp • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

26 Dec 2019 — CrushFTP through 8.3.0 is vulnerable to credentials theft via URL redirection. CrushFTP versiones hasta 8.3.0 es vulnerable al robo de credenciales por medio del redireccionamiento de la URL. • https://www.crushftp.com/version8_build.html • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

30 Aug 2017 — CrushFTP before 7.8.0 and 8.x before 8.2.0 has a redirect vulnerability. CrushFTP en versiones anteriores a la 7.8.0 y 8.x anteriores a la 8.2.0 tiene una vulnerabilidad de redirección. • https://crushftp.com/version7.html • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

30 Aug 2017 — CrushFTP before 7.8.0 and 8.x before 8.2.0 has an HTTP header vulnerability. CrushFTP en versiones anteriores a la 7.8.0 y 8.x anteriores a la 8.2.0 tiene una vulnerabilidad de cabeceras HTTP. • https://crushftp.com/version7.html • CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

30 Aug 2017 — CrushFTP 8.x before 8.2.0 has a serialization vulnerability. CrushFTP en versiones 8.x anteriores a la 8.2.0 tiene una vulnerabilidad de serialización. • https://crushftp.com/version8.html • CWE-502: Deserialization of Untrusted Data •