""ET WEB_SPECIFIC_APPS CrushFTP working_dir Template Injection Attempt (CVE-2024-4040)""
SID: 2052277
Revision: 1
Class Type: attempted-recon
Metadata: affected_product CrushFTP, attack_target FTP_Server, tls_state TLSDecrypt, created_at 2024_04_26, cve CVE_2024_4040, deployment Perimeter, deployment Internal, deployment SSLDecrypt, performance_impact Low, confidence High, signature_severity Major, updated_at 2024_04_26, mitre_tactic_id TA0009, mitre_tactic_name Collection, mitre_technique_id T1005, mitre_technique_name Data_from_local_system
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "POST"
-
Value: "/WebInterface/function/?command|3d|" Depth: 32
-
Value: "c2f|3d|"
-
Value: "path|3d 7b|working_dir|7d|"
-
Value: "names|3d|"
-
Value: "CrushAuth|3d|"
-
Value: "c2f|3d|"
Within:
PCRE:
Special Options:
-
http_method
-
http_uri
-
http_uri
-
http_uri
-
http_uri
-
http_cookie
-
http_cookie