Bruteforce Scans for CrushFTP , (Tue, Mar 3rd)
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容。 文章主要讲的是CrushFTP这个基于Java的开源文件传输系统存在的一些漏洞,比如CVE-2024-4040、CVE-2025-31161和CVE-2025-54309。这些漏洞包括模板注入、认证绕过和零日漏洞,影响了多个操作系统。最近的攻击不是利用这些漏洞,而是通过暴力破解攻击,目标是那些配置不安全的系统。攻击者使用简单的POST请求,将用户名和密码作为GET参数传递,利用管理员可能使用默认用户名和密码的情况。攻击来源是一个法国的IP地址,之前也有类似的攻击历史。 接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:CrushFTP是开源文件传输系统,存在多个漏洞;最近被暴力破解攻击针对配置不安全的系统;攻击利用默认用户名密码;来自法国IP的历史活跃地址。 然后组织语言,确保简洁明了。避免使用复杂的句子结构,直接陈述事实。 最后检查字数是否符合要求,并确保没有遗漏重要信息。 </think> CrushFTP是一款基于Java的开源文件传输系统,曾曝出多个严重漏洞。近期攻击者通过暴力破解针对配置不安全的系统发起攻击,利用默认用户名密码组合进行登录尝试。攻击源自法国IP地址,该地址曾多次尝试利用简单漏洞进行攻击。 2026-3-3 15:1:17 Author: isc.sans.edu(查看原文) 阅读量:6 收藏

CrushFTP is a Java-based open source file transfer system. It is offered for multiple operating systems. If you run a CrushFTP instance, you may remember that the software has had some serious vulnerabilities: CVE-2024-4040 (the template-injection flaw that let unauthenticated attackers escape the VFS sandbox and achieve RCE), CVE-2025-31161 (the auth-bypass that handed over the crushadmin account on a silver platter), and the July 2025 zero-day CVE-2025-54309 that was actively exploited in the wild.

But what we are seeing now is not an exploit of a specific vulnerability, but rather simple brute-forcing, looking for lazily configured systems.

The requests we are seeing right now:

POST /WebInterface/function/?command=login&username=crushadmin&password=crushadmin HTTP/1.1
Host: [redacted]
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.137 Safari/537.36
Content-Length: 0
Accept-Encoding: gzip
Connection: close

Note that these are POST requests, but the username and password are passed as GET parameters. The body of the request is empty.

During setup, CrushFTP requires that the user configure an admin user. The username is not fixed, but "crushadmin" is one of the suggested usernames. Others are "root" and "admin". There is no default or suggested password. The attacker relies on lazy administrators who use "crushadmin" as both a username and a password.

These attacks originate from 5.189.139.225, a French IP address with a history of exploit attempts targeting simple vulnerabilities. We have seen this IP acting up since around February.

--
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|


文章来源: https://isc.sans.edu/diary/rss/32762
如有侵权请联系:admin#unsafe.sh