Vulnerability Details : CVE-2023-43177
Public exploit exists!
CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes.
Products affected by CVE-2023-43177
- cpe:2.3:a:crushftp:crushftp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-43177
95.96%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2023-43177
-
CrushFTP Unauthenticated RCE
Disclosure Date: 2023-08-08First seen: 2024-04-18exploit/multi/http/crushftp_rce_cve_2023_43177This exploit module leverages an Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability (CVE-2023-43177) to achieve unauthenticated remote code execution. This affects CrushFTP versions prior to 10.5.1. It is p
CVSS scores for CVE-2023-43177
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-43177
-
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-43177
-
https://github.com/the-emmons/CVE-Disclosures/blob/main/Pending/CrushFTP-2023-1.md
CVE-Disclosures/Pending/CrushFTP-2023-1.md at main · the-emmons/CVE-Disclosures · GitHubThird Party Advisory
-
https://convergetp.com/2023/11/16/crushftp-zero-day-cve-2023-43177-discovered/
CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated Remote Code Execution - Converge Technology SolutionsExploit;Third Party Advisory
Jump to