Skip to content

Commit 04d8173

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent d52de7f commit 04d8173

File tree

1 file changed

+55
-0
lines changed

1 file changed

+55
-0
lines changed

db/modules_metadata_base.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18751,6 +18751,61 @@
1875118751
"needs_cleanup": false,
1875218752
"actions": []
1875318753
},
18754+
"auxiliary_gather/crushftp_authbypass_cve_2025_2825": {
18755+
"name": "CrushFTP AWS4-HMAC Authentication Bypass",
18756+
"fullname": "auxiliary/gather/crushftp_authbypass_cve_2025_2825",
18757+
"aliases": [],
18758+
"rank": 300,
18759+
"disclosure_date": null,
18760+
"type": "auxiliary",
18761+
"author": [
18762+
"Outpost24",
18763+
"remmons-r7"
18764+
],
18765+
"description": "This module leverages an authentication bypass in CrushFTP 11 < 11.3.1 and 10 < 10.8.4. Attackers\n with knowledge of a valid username can provide a crafted S3 authentication header to the CrushFTP web API\n to authenticate as that user without valid credentials. When successfully executed, the exploit will\n output working session cookies for the target user account.",
18766+
"references": [
18767+
"CVE-2025-2825",
18768+
"URL-https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis"
18769+
],
18770+
"platform": "",
18771+
"arch": "",
18772+
"rport": 8080,
18773+
"autofilter_ports": [
18774+
80,
18775+
8080,
18776+
443,
18777+
8000,
18778+
8888,
18779+
8880,
18780+
8008,
18781+
3000,
18782+
8443
18783+
],
18784+
"autofilter_services": [
18785+
"http",
18786+
"https"
18787+
],
18788+
"targets": null,
18789+
"mod_time": "2025-04-03 10:24:46 +0000",
18790+
"path": "/modules/auxiliary/gather/crushftp_authbypass_cve_2025_2825.rb",
18791+
"is_install_path": true,
18792+
"ref_name": "gather/crushftp_authbypass_cve_2025_2825",
18793+
"check": false,
18794+
"post_auth": true,
18795+
"default_credential": false,
18796+
"notes": {
18797+
"Stability": [
18798+
"crash-safe"
18799+
],
18800+
"SideEffects": [
18801+
"ioc-in-logs"
18802+
],
18803+
"Reliability": []
18804+
},
18805+
"session_types": false,
18806+
"needs_cleanup": false,
18807+
"actions": []
18808+
},
1875418809
"auxiliary_gather/crushftp_fileread_cve_2024_4040": {
1875518810
"name": "CrushFTP Unauthenticated Arbitrary File Read",
1875618811
"fullname": "auxiliary/gather/crushftp_fileread_cve_2024_4040",

0 commit comments

Comments
 (0)