CrushFTP Security Snafu: Your Server’s Back Door is Wide Open!
CrushFTP before versions 10.8.4 and 11.3.1 has a hilarious blunder. Thanks to a race condition and some sloppy header parsing in AWS4-HMAC authorization, you can skip all that pesky authentication and waltz in as admin. Who knew bypassing security could be easier than getting your cat to come inside?

Hot Take:
Well, who knew that a simple header parsing flaw could turn your FTP server into a “Free Takeover Party”? If your FTP is “Crush”ing under this new CVE, it might be time to “crush” it into oblivion or at least update it before hackers RSVP!
Key Points:
- CrushFTP versions before 10.8.4 and 11.3.1 are vulnerable to authentication bypass.
- A race condition and header parsing flaw in AWS4-HMAC authorization is to blame.
- Attackers can log in as any user, even admin, without a password.
- Exploit tested on several OS including Ubuntu, Windows Server, and Kali Linux.
- Security patch needed to prevent unauthorized access and admin takeover.
Already a member? Log in here