'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_app:crushFTP_server_side_template_injection(Rule ID:1070210315)

Release Date2025/9/15

Rule NameCVE-2024-4040: CrushFTP Server Side Template Injection Vulnerability

Severity:critical

CVE IDCVE-2024-4040

 

Descripiton

CrushFTP is a file transfer server software that supports multiple protocols and security features and is widely used for enterprise and personal file transfer and management needs. A server side template injection vulnerability in CrushFTP in all versions prior to 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote malicious users to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
Other reference:None

 

Solution

Update vendor patches.