""ET WEB_SPECIFIC_APPS CrushFTP Arbitrary File Read Attempt (CVE-2024-4040)""
SID: 2052276
Revision: 1
Class Type: web-application-attack
Metadata: affected_product CrushFTP, attack_target FTP_Server, tls_state TLSDecrypt, created_at 2024_04_26, cve CVE_2024_4040, deployment Perimeter, deployment Internal, deployment SSLDecrypt, performance_impact Low, confidence High, signature_severity Major, updated_at 2024_04_26, mitre_tactic_id TA0010, mitre_tactic_name Exfiltration, mitre_technique_id T1567, mitre_technique_name Exfiltration_Over_Web_Service
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "POST"
-
Value: "/WebInterface/function/?command|3d|" Depth: 32
-
Value: "c2f|3d|"
-
Value: "path|3d 3c|INCLUDE|3e 2f|"
-
Value: "names|3d|"
-
Value: "CrushAuth|3d|"
-
Value: "c2f|3d|"
Within:
PCRE:
Special Options:
-
http_method
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_cookie
-
http_cookie