exploitdb
SCANNER
by VeryLazyTech · pythonwebappstypescript
https://www.exploit-db.com/exploits/52102
This script scans for CVE-2024-23692, a directory traversal vulnerability in Rejetto HTTP File Server 2.3m, by attempting to read sensitive files like /etc/passwd and /etc/shadow. It does not execute arbitrary code but checks for file disclosure.
Classification
Scanner 90%
Target:
Rejetto HTTP File Server 2.3m
No auth needed
Prerequisites:
Network access to the target server
nomisec
WORKING POC
43 stars
by verylazytech · remote
https://github.com/verylazytech/CVE-2024-23692
The repository contains a functional bash script that exploits CVE-2024-23692, an unauthenticated RCE vulnerability in Rejetto HTTP File Server (HFS) 2.3m. The exploit crafts a malicious URL with a PowerShell command payload to achieve remote code execution.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS) 2.3m
No auth needed
Prerequisites:
Target running Rejetto HFS 2.3m · Network access to the target
nomisec
WORKING POC
16 stars
by jakabakos · remote
https://github.com/jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFS
This repository contains functional exploit and detection scripts for CVE-2024-23692, an unauthenticated RCE vulnerability in Rejetto HTTP File Server (HFS) version 2.3m. The exploit leverages a crafted HTTP GET request with a malicious search parameter to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS) version 2.3m
No auth needed
Prerequisites:
Network access to the target server · Target running Rejetto HFS version 2.3m
nomisec
WORKING POC
13 stars
by 0x20c · remote
https://github.com/0x20c/CVE-2024-23692-EXP
This repository contains a functional exploit for CVE-2024-23692, a template injection vulnerability in Rejetto HTTP File Server (HFS) that allows remote command execution. The exploit includes a bash script for direct command execution and a Nuclei template for detection.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS)
No auth needed
Prerequisites:
Target running vulnerable Rejetto HFS · Network access to the target
nomisec
WORKING POC
10 stars
by vanboomqi · remote
https://github.com/vanboomqi/CVE-2024-23692
The repository contains a functional Python exploit for CVE-2024-23692, a template injection vulnerability in Rejetto HTTP File Server (HFS) 2.3m and earlier, allowing unauthenticated remote code execution via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS) 2.3m and earlier
No auth needed
Prerequisites:
Target running vulnerable HFS version · Network access to the target
nomisec
WORKING POC
6 stars
by BBD-YZZ · remote
https://github.com/BBD-YZZ/CVE-2024-23692
This repository contains a functional exploit for CVE-2024-23692, targeting Rejetto HTTP File Server (HFS) versions <= 2.3. The exploit leverages a template injection vulnerability to achieve remote code execution (RCE) via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server <= 2.3
No auth needed
Prerequisites:
Network access to the target HFS server
nomisec
WORKING POC
3 stars
by NanoWraith · poc
https://github.com/NanoWraith/CVE-2024-23692
The repository contains a functional Python script that exploits CVE-2024-23692, a Server-Side Template Injection (SSTI) vulnerability leading to Remote Code Execution (RCE). The script sends a crafted HTTP request with a malicious payload to trigger command execution (e.g., 'ipconfig /all') and checks for vulnerability by detecting multiple 'RESULT' strings in the response.
Classification
Working Poc 95%
Target:
Unknown (likely a web application with SSTI vulnerability)
No auth needed
Prerequisites:
Target URL list in 'xxx.txt' · Python 3 environment · Network access to target
nomisec
WORKING POC
1 stars
by NingXin2002 · remote
https://github.com/NingXin2002/HFS2.3_poc
This repository contains a functional exploit PoC for CVE-2024-23692, an unauthenticated remote code execution vulnerability in HFS 2.3. The script sends a crafted HTTP request to trigger command execution via template injection.
Classification
Working Poc 95%
Target:
HFS (HTTP File Server) 2.3
No auth needed
Prerequisites:
Target running HFS 2.3 with exposed web interface
nomisec
WORKING POC
1 stars
by pradeepboo · poc
https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692
This repository contains a functional exploit for CVE-2024-23692, an unauthenticated Server-Side Template Injection (SSTI) vulnerability in Rejetto HTTP File Server (HFS) versions 2.4.0 RC7 and 2.3m. The exploit leverages Metasploit to achieve remote code execution (RCE) on vulnerable targets.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS) 2.4.0 RC7, 2.3m
No auth needed
Prerequisites:
Metasploit framework · Network access to the target HFS instance
nomisec
WORKING POC
by wgetnz · poc
https://github.com/wgetnz/hfs2
This repository contains functional exploit code for CVE-2024-23692, targeting memory management vulnerabilities in Borland C++ Builder applications. The code includes patches and hooks for memory allocation functions, demonstrating the ability to manipulate memory management behavior.
Classification
Working Poc 90%
Target:
Borland C++ Builder (various versions)
No auth needed
Prerequisites:
Access to the target system · Ability to execute arbitrary code
nomisec
WORKING POC
by 999gawkboyy · remote
https://github.com/999gawkboyy/CVE-2024-23692_Exploit
This repository contains a functional exploit for CVE-2024-23692, targeting HFS (HTTP File Server) versions 2.3 and below. The exploit leverages a command injection vulnerability to execute arbitrary commands on the server via a crafted HTTP request.
Classification
Working Poc 95%
Target:
HFS (HTTP File Server) 2.3 and below
No auth needed
Prerequisites:
Target server running vulnerable HFS version · Network access to the target server
nomisec
WORKING POC
by Tupler · remote
https://github.com/Tupler/CVE-2024-23692-exp
This repository contains a functional exploit for CVE-2024-23692, targeting HFS (HTTP File Server) versions <= 2.4 RC7. The exploit sends a crafted HTTP GET request with a command injection payload to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
HFS (HTTP File Server) <= 2.4 RC7
No auth needed
Prerequisites:
Network access to the target HFS server · HFS version <= 2.4 RC7
nomisec
WORKING POC
by Mr-r00t11 · remote
https://github.com/Mr-r00t11/CVE-2024-23692
The repository contains a functional exploit script for CVE-2024-23692, a Server-Side Template Injection (SSTI) vulnerability in Rejetto HFS. The script crafts a malicious HTTP request to execute arbitrary commands on the target server, demonstrating remote code execution (RCE).
Classification
Working Poc 95%
Target:
Rejetto HFS (HTTP File Server)
No auth needed
Prerequisites:
Target IP address · Target port · Command to execute
nomisec
WORKING POC
by WanLiChangChengWanLiChang · remote
https://github.com/WanLiChangChengWanLiChang/CVE-2024-23692-RCE
This repository contains a functional Go-based exploit for CVE-2024-23692, targeting Rejetto HTTP File Server (HFS) versions 2.3 and below. The exploit sends crafted HTTP GET requests to execute arbitrary commands via template injection in the 'search' parameter.
Classification
Working Poc 95%
Target:
Rejetto HTTP File Server (HFS) <= 2.3
No auth needed
Prerequisites:
Network access to the target HFS server · HFS server with exposed HTTP interface
vulncheck_xdb
WORKING POC
remote
https://github.com/k3lpi3b4nsh33/CVE-2024-23692
The repository contains a functional Python script that exploits CVE-2024-23692, a Server-Side Template Injection (SSTI) vulnerability leading to Remote Code Execution (RCE). The script sends a crafted HTTP request with a malicious payload to execute arbitrary commands (e.g., 'ipconfig /all') and checks for vulnerability by detecting multiple 'RESULT' strings in the response.
Classification
Working Poc 95%
Target:
Unknown (likely a web application with SSTI vulnerability)
No auth needed
Prerequisites:
Target URL list in 'xxx.txt' file · Python 3 environment · Network connectivity to target
metasploit
WORKING POC
EXCELLENT
by sfewer-r7, Arseniy Sharoglazov · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/rejetto_hfs_rce_cve_2024_23692.rb
This Metasploit module exploits an unauthenticated server-side template injection (SSTI) vulnerability in Rejetto HTTP File Server (HFS) 2.x, allowing remote code execution with the privileges of the user running the HFS.exe process. The exploit leverages the 'exec' macro and 'chr' macro to bypass character filtering and execute arbitrary commands.
Classification
Working Poc 100%
Target:
Rejetto HTTP File Server (HFS) 2.x (tested on 2.4.0 RC7 and 2.3m)
No auth needed
Prerequisites:
Network access to the target HFS server · HFS server running version 2.x