vendor:
HFS (HTTP File Server)
by:
Pergyz
9.8
CVSS
CRITICAL
Remote Command Execution
78
CWE
Product Name: HFS (HTTP File Server)
Affected Version From: 2.3
Affected Version To: 2.3.x
Patch Exists: YES
Related CWE: CVE-2014-6287
CPE: cpe:2.3
Tags: packetstorm,msf,cve,cve2014,hfs,rce,kev
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6287, http://www.kb.cert.org/vuls/id/251276, http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html, https://github.com/rapid7/metasploit-framework/pull/3793, https://nvd.nist.gov/vuln/detail/CVE-2014-6287
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'http.favicon.hash:2124459909', 'verified': True, 'vendor': 'rejetto', 'product': 'http_file_server'}
Platforms Tested: Microsoft Windows Server 2012 R2 Standard
2021
HFS (HTTP File Server) 2.3.x – Remote Command Execution (3)
This exploit allows an attacker to execute arbitrary commands on a target system running HFS (HTTP File Server) version 2.3.x. The vulnerability exists due to improper handling of user input, which allows an attacker to inject malicious commands. By exploiting this vulnerability, an attacker can gain unauthorized access and execute commands with the privileges of the HFS application.
Mitigation:
To mitigate this vulnerability, it is recommended to update to the latest version of HFS (HTTP File Server) and ensure that input validation and sanitization mechanisms are implemented properly.