Skip to content

Commit 906776a

Browse files
committed
crushftp auth bypass session logs
1 parent d190f58 commit 906776a

File tree

2 files changed

+7
-2
lines changed

2 files changed

+7
-2
lines changed
Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
author: Michael Haag, Splunk
22
id: 1e1c1f1c-0b0b-4b0b-8b0b-0b0b0b0b0b0d
33
date: '2024-05-23'
4-
description: Generated event logs from CrushFTP server from simulated attack leveraging CVE-2024-4040.
4+
description: Generated event logs from CrushFTP server from simulated attack leveraging CVE-2024-4040 and CVE-2025-31161,.
55
environment: attack_range
66
dataset:
77
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/crushftp/crushftp.log
8+
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/crushftp/crushftp11_session.log
89
sourcetypes:
910
- crushftp:sessionlogs
1011
references:
1112
- https://attack.mitre.org/techniques/T1190
1213
- https://github.com/airbus-cert/CVE-2024-4040
13-
- https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
14+
- https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
15+
- https://www.huntress.com/blog/crushftp-cve-2025-31161-auth-bypass-and-post-exploitation
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
version https://git-lfs.github.com/spec/v1
2+
oid sha256:540647b42c934ae59d139c2a3344c1056a412875bf0d04770540e1920d2c6420
3+
size 289353

0 commit comments

Comments
 (0)