CVE-2014-6287

The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.
References
Link Resource
http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/251276 Third Party Advisory US Government Resource
https://github.com/rapid7/metasploit-framework/pull/3793 Exploit
https://www.exploit-db.com/exploits/39161/ Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/251276 Third Party Advisory US Government Resource
https://github.com/rapid7/metasploit-framework/pull/3793 Exploit
https://www.exploit-db.com/exploits/39161/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:14

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.kb.cert.org/vuls/id/251276 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/251276 - Third Party Advisory, US Government Resource
References () https://github.com/rapid7/metasploit-framework/pull/3793 - Exploit () https://github.com/rapid7/metasploit-framework/pull/3793 - Exploit
References () https://www.exploit-db.com/exploits/39161/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/39161/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2014-10-07 10:55

Updated : 2024-11-21 02:14


NVD link : CVE-2014-6287

Mitre link : CVE-2014-6287

CVE.ORG link : CVE-2014-6287


JSON object : View

Products Affected

rejetto

  • http_file_server
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')