CrushFTP Authentication Bypass Vulnerability Exploited in Attacks (CVE-2025-2825)

Threat actors target an authentication bypass vulnerability in the CrushFTP file transfer software using exploits based on publicly available proof-of-concept code. Tracked as CVE-2025-2825, the vulnerability has a critical severity rating with a CVSS score of 9.8. Successful exploitation of the vulnerability may allow unauthenticated attackers to bypass authentication and gain unauthorized access.

CrushFTP is a widely used, robust, multi-protocol file transfer server that exchanges secure data between systems and users. The server enables simple file transfers for users with only a web browser. It offers an extensive feature set, including Amazon S3-compatible API access.

A quick search revealed more than 234,000 publicly available targets on Fofa at the time of writing.

Vulnerability Details

CrushFTP is a flexible file transfer solution that supports several protocols, such as FTP, SFTP, WebDAV, and HTTP/S. It also incorporates S3-compatible API access as of version 10, enabling clients to communicate like the Amazon S3 storage services API.

S3 authentication typically uses a request signing mechanism where clients include an Authorization header. The server extracts the AccessKey value from the Credential field to identify the user, then verifies the Signature to ensure the request is authentic.

The flaw exists in CrushFTP’s implementation of Amazon S3-compatible API access. Specifically, the loginCheckHeaderAuth() method in ServerSessionHTTP.java improperly handles the Authorization header. The lookup_user_pass flag is misused, leading to an authentication bypass when processing S3 authentication headers.

The lookup_user_pass flag determines whether to retrieve a user’s password from storage or use a provided password. The flag is incorrectly set to true by default. This default setting and the flag’s dual role allow the attackers to bypass authentication.

The Qualys Threat Research Unit confirmed the vulnerability by successfully testing the proof of concept in the lab environment.

A GET request to the /WebInterface/function/?command=getUserList&serverGroup=MainUsers endpoint without cookie results in a 404 response. However, when a random cookie is included along with the ‘Authorization: AWS4-HMAC-SHA256’ header, the server returns a list of users, exposing sensitive information on the vulnerable system.

Image Source: Qualys Threat Research Unit

Image Source: Qualys Threat Research Unit

Affected Versions

  • CrushFTP version 10.0.0 to 10.8.3
  • CrushFTP version 11.3.0 to 11.3.2

Mitigation

Users must upgrade to the following versions to patch the vulnerability:

  • CrushFTP 10.8.4 and later
  • CrushFTP 11.3.1 and later

For more information, please refer to the ProjectDiscovery Security Advisory.

Qualys Detection

Qualys customers can scan their devices with QIDs 382978 and 732399 to detect vulnerable assets.

Please continue to follow Qualys Threat Protection for more coverage of the latest vulnerabilities.

References
https://projectdiscovery.io/blog/crushftp-authentication-bypass

Leave a Reply

Your email address will not be published. Required fields are marked *