HFS (HTTP File Server) version 2.3.x remote code execution exploit.
d5259779819e2ec48d535d544c03503c184fbc5382e90d8a57b7ba07265969f1
Rejetto HttpFileServer version 2.3.x remote command execution exploit.
310bea739ee1fac51d3f1db221d66f715bce9e829391ed0701992c620390aa02
Rejetto HTTP File Server (HFS) version 2.3.x remote code execution exploit.
564de1b1210ad745720d578506be2ca9a67d73c9e8eef4952f8daf68fa90b221
Rejetto HttpFileServer (HFS) is vulnerable to remote command execution attack due to a poor regex in the file ParserLib.pas. This Metasploit module exploit the HFS scripting commands by using '%00' to bypass the filtering. This Metasploit module has been tested successfully on HFS 2.3b over Windows XP SP3, Windows 7 SP1 and Windows 8.
d93a3f4493d008291488a8f9c338e5bc4d1561a09f2e7cbaa2c9a044cfd8f541
HttpFileServer version 2.3.x suffers from a remote command execution vulnerability due to a poorly formed regex.
b3271bba3fc147d5debc54d8dbb9d30c83064441e55e54ba453b1f75c0faa5bc