The one where we just steal the vulnerabilities CrushFTP CVE... #1362
+117
−7
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
CrushFTP Authentication Bypass (CVE‑2025‑54309) — Technical Summary
Vulnerable when the DMZ proxy feature is not used.
Affected product and versions
🔧 Technical Details
Session identity poisoning via AS2 header: If an app path sets the authenticated user from an AS2 header, send a request with
AS2-TO: \<targetUser>
so the server mutates the current session’s username without credentials. Reuse the same session cookies (CrushAuth
/currentAuth
) across requests.Race the privileged operation: Immediately issue a second request (no AS2 header) that performs a privileged admin RPC (e.g., user cr...
🤖 Agent Actions
I analyzed the blog and repository, found the right spot, and updated HackTricks with the new technique.
What I added:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
🗑️ File Cleanup
The searchindex.js file is automatically generated and should not be included in manual commits.