exploitdb
WORKING POC
VERIFIED
by Avinash Thapa · pythonremotewindows
https://www.exploit-db.com/exploits/39161
This exploit targets a remote command execution vulnerability in HttpFileServer 2.3.x by leveraging a search query injection to execute arbitrary commands. It downloads and executes a netcat binary to establish a reverse shell.
Classification
Working Poc 95%
Target:
HttpFileServer 2.3.x
No auth needed
Prerequisites:
Attacker-controlled web server hosting nc.exe · Network access to target
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/34926
This Metasploit module exploits a remote command execution vulnerability in Rejetto HttpFileServer (HFS) by bypassing a poor regex filter using '%00' to inject malicious scripting commands. It delivers a VBS payload via HTTP and executes it on the target system.
Classification
Working Poc 100%
Target:
Rejetto HttpFileServer (HFS) <= 2.3
No auth needed
Prerequisites:
Network access to the target HFS server · Target must be running HFS version <= 2.3
exploitdb
WORKING POC
VERIFIED
by Daniele Linguaglossa · textremotewindows
https://www.exploit-db.com/exploits/34668
This exploit leverages a regex bypass in HttpFileServer 2.3.x via a null byte injection, allowing remote command execution through the `{.exec|cmd.}` macro. The vulnerability arises from improper handling of null bytes in the `ParserLib.pas` regex pattern.
Classification
Working Poc 90%
Target:
HttpFileServer 2.3.x
No auth needed
Prerequisites:
Network access to the target server · HttpFileServer 2.3.x running with default or vulnerable configuration
exploitdb
WORKING POC
by Óscar Andreu · pythonwebappswindows
https://www.exploit-db.com/exploits/49125
This exploit leverages a remote command execution vulnerability in Rejetto HttpFileServer 2.3.x by injecting a malicious search parameter. The payload is executed via the `exec` function in the HFS template engine.
Classification
Working Poc 95%
Target:
Rejetto HttpFileServer 2.3.x
No auth needed
Prerequisites:
Target running Rejetto HttpFileServer 2.3.x · Network access to the target
nomisec
WORKING POC
2 stars
by randallbanner · remote
https://github.com/randallbanner/Rejetto-HTTP-File-Server-HFS-2.3.x---Remote-Command-Execution
This is a functional exploit for CVE-2014-6287, targeting Rejetto HTTP File Server (HFS) 2.3.x. It leverages a remote command execution vulnerability by crafting a malicious search query to execute a PowerShell reverse shell payload.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS) 2.3.x
No auth needed
Prerequisites:
Network access to the target HFS server · Target server must be running HFS 2.3.x · PowerShell must be available on the target system
nomisec
WORKING POC
1 stars
by hadrian3689 · remote
https://github.com/hadrian3689/rejetto_hfs_rce
This Python script exploits CVE-2014-6287 in Rejetto HFS 2.3.x by sending a crafted HTTP request with a PowerShell reverse shell payload. It uses threading to simultaneously trigger the exploit and start a netcat listener for the reverse shell.
Classification
Working Poc 95%
Target:
Rejetto HFS 2.3.x
No auth needed
Prerequisites:
Target running Rejetto HFS 2.3.x · Network access to the target · Listener setup on attacker's machine
nomisec
WORKING POC
1 stars
by mrintern · remote
https://github.com/mrintern/thm_steelmountain_CVE-2014-6287
This is a Python 3 exploit for CVE-2014-6287, targeting HttpFileServer 2.3.x. It leverages a remote command execution vulnerability by crafting malicious search queries to download and execute a reverse shell payload.
Classification
Working Poc 95%
Target:
HttpFileServer 2.3.x
No auth needed
Prerequisites:
Attacker-controlled web server hosting netcat · Network access to target
nomisec
WRITEUP
by R3fr4kt · poc
https://github.com/R3fr4kt/Optimum
This repository provides a detailed technical walkthrough of exploiting CVE-2014-6287 in Rejetto HTTP File Server 2.3, including reconnaissance, vulnerability identification, and privilege escalation steps using Metasploit and WinPEAS.
Classification
Writeup 100%
Target:
Rejetto HTTP File Server 2.3
No auth needed
Prerequisites:
Network access to target · Metasploit framework · WinPEAS for privilege escalation
nomisec
WORKING POC
by jagg3rsec · remote
https://github.com/jagg3rsec/CVE-2014-6287
This PoC exploits CVE-2014-6287, a remote code execution vulnerability in Rejetto HTTP File Server (HFS) via macro injection. It sends a crafted HTTP request with a PowerShell reverse shell payload encoded in Base64 to the target.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS) 2.3.x
No auth needed
Prerequisites:
Target IP running vulnerable HFS · Attacker-controlled listener on specified port
nomisec
WORKING POC
by JoaZ94 · remote
https://github.com/JoaZ94/rejjeto_hfs-rce-exploit-cve-2014-6287
This is a Python 3 rewrite of the CVE-2014-6287 exploit targeting Rejetto HTTP File Server (HFS) v2.3.x, enabling remote command execution via VBScript payloads and a reverse shell using nc.exe.
Classification
Working Poc 100%
Target:
Rejetto HTTP File Server (HFS) v2.3.x
No auth needed
Prerequisites:
Vulnerable HFS version with scripting enabled · HTTP server hosting nc.exe · Listener for reverse shell
nomisec
WORKING POC
by nika0x38 · remote
https://github.com/nika0x38/CVE-2014-6287
This is a Rust-based exploit for CVE-2014-6287, targeting Rejetto HTTP File Server (HFS) versions 2.3x before 2.3c. It leverages a null byte injection in the search function to execute arbitrary PowerShell commands, resulting in a reverse shell.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS) 2.3x before 2.3c
No auth needed
Prerequisites:
Network access to the target HFS server · A listener set up on the attacker's machine to catch the reverse shell
nomisec
WORKING POC
by rahisec · remote
https://github.com/rahisec/rejetto-http-file-server-2.3.x-RCE-exploit-CVE-2014-6287
This exploit targets CVE-2014-6287 in Rejetto HTTP File Server 2.3.x, leveraging a remote command execution vulnerability via crafted search parameters. It delivers a VBScript payload to download and execute a reverse shell using Netcat.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server 2.3.x
No auth needed
Prerequisites:
Attacker-controlled HTTP server hosting nc.exe · Netcat listener on attacker machine · Network access to target
nomisec
WORKING POC
by Z3R0space · poc
https://github.com/Z3R0space/CVE-2014-6287
This repository contains a functional Python exploit for CVE-2014-6287, targeting Rejetto HttpFileServer 2.3.x. The exploit abuses the search functionality to inject a crafted payload, enabling remote command execution via a GET request with a malformed search parameter.
Classification
Working Poc 95%
Target:
Rejetto HttpFileServer 2.3.x
No auth needed
Prerequisites:
Network access to the target server · HttpFileServer 2.3.x running on the target
nomisec
WORKING POC
by Z3R0-0x30 · remote
https://github.com/Z3R0-0x30/CVE-2014-6287
This is a functional Python exploit for CVE-2014-6287, targeting Rejetto HttpFileServer 2.3.x. It leverages a command injection vulnerability in the search functionality to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Rejetto HttpFileServer 2.3.x
No auth needed
Prerequisites:
Network access to the target HttpFileServer · HttpFileServer 2.3.x running on the target
nomisec
WORKING POC
by francescobrina · remote
https://github.com/francescobrina/hfs-cve-2014-6287-exploit
This is a Python-based exploit for CVE-2014-6287, targeting HTTP File Server (HFS) 2.3.x. It executes arbitrary PowerShell commands via a reverse shell by leveraging a command injection vulnerability in the search parameter.
Classification
Working Poc 95%
Target:
HTTP File Server (HFS) 2.3.x
No auth needed
Prerequisites:
Python 3.6+ · Netcat for reverse shell · Network access to target HFS server
github
WORKING POC
by dugisan3rd · pythonpoc
https://github.com/dugisan3rd/exploit/tree/main/cve-2014-6287
This repository contains a functional Python exploit for CVE-2014-6287, a blind remote command execution vulnerability in Rejetto HTTP File Server (HFS) 2.3.x. The exploit crafts a malicious HTTP request with a payload embedded in the 'search' parameter to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS) 2.3.x
No auth needed
Prerequisites:
Target running Rejetto HFS 2.3.x · Network access to the target
nomisec
WORKING POC
by zhsh9 · remote
https://github.com/zhsh9/CVE-2014-6287
This is a Python3 exploit for CVE-2014-6287, targeting HttpFileServer 2.3.x. It leverages a remote command execution vulnerability by sending crafted HTTP requests to download and execute a reverse shell payload via SMB.
Classification
Working Poc 95%
Target:
HttpFileServer 2.3.x
No auth needed
Prerequisites:
SMB server hosting nc.exe · Network connectivity to target · Listener for reverse shell
nomisec
WORKING POC
by 10cks · remote
https://github.com/10cks/CVE-2014-6287
This repository contains a functional exploit for CVE-2014-6287, targeting Rejetto HTTP File Server 2.3.x. The exploit leverages a command injection vulnerability via the search parameter to execute a PowerShell reverse shell payload, with both Python and Bash scripts provided for execution.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server 2.3.x
No auth needed
Prerequisites:
Target URL with vulnerable Rejetto HTTP File Server · Attacker-controlled listener (netcat) · Network connectivity to the target
nomisec
WORKING POC
by roughiz · remote
https://github.com/roughiz/cve-2014-6287.py
This exploit targets CVE-2014-6287 in HttpFileServer 2.3.x, leveraging a remote command execution vulnerability via crafted search parameters. It downloads and executes a reverse shell payload (nc.exe) on the target system.
Classification
Working Poc 95%
Target:
HttpFileServer 2.3.x
No auth needed
Prerequisites:
Attacker-controlled HTTP server hosting nc.exe · Network access to target
nomisec
WORKING POC
by wizardy0ga · remote
https://github.com/wizardy0ga/THM-Steel_Mountain-CVE-2014-6287
This repository contains a writeup and a Python-based exploit for CVE-2014-6287, a remote code execution vulnerability in Rejetto HTTP File Server (HFS) 2.3. The exploit leverages a null-byte injection in the search parameter to execute arbitrary commands.
Classification
Working Poc | Writeup 95%
Target:
Rejetto HTTP File Server (HFS) 2.3
No auth needed
Prerequisites:
Network access to the target HFS server · HFS 2.3 running on the target
metasploit
WORKING POC
EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/rejetto_hfs_exec.rb
This Metasploit module exploits a remote command execution vulnerability in Rejetto HttpFileServer (HFS) by bypassing a poor regex filter using '%00'. It leverages HFS scripting commands to save and execute a malicious VBScript payload, achieving RCE on vulnerable versions (≤ 2.3).
Classification
Working Poc 100%
Target:
Rejetto HttpFileServer (HFS) ≤ 2.3
No auth needed
Prerequisites:
Network access to the target HFS server · Target running HFS version ≤ 2.3