Description
The file comment feature in Rejetto HTTP File Server (hfs) 2.3c and earlier allows remote attackers to execute arbitrary code by uploading a file with certain invalid UTF-8 byte sequences that are interpreted as executable macro symbols.
Exploits (1)
exploitdb
WORKING POC
by Daniele Linguaglossa · textwebappswindows
https://www.exploit-db.com/exploits/34852
References (4)
Core 4
Core References
Exploit x_refsource_misc
http://packetstormsecurity.com/files/128532/HTTP-File-Server-2.3a-2.3b-2.3c-Remote-Command-Execution.html
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/34852
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/70216
Vendor Advisory x_refsource_confirm
http://www.rejetto.com/forum/hfs-~-http-file-server/new-version-2-3d/
Scores
EPSS
0.0806
EPSS Percentile
92.1%
Details
CWE
CWE-94
Status
published
Products (1)
rejetto/http_file_server
< 2.3c
Published
Oct 10, 2014
Tracked Since
Feb 18, 2026