Rejetto HttpFileServer version 2.3.x remote command execution exploit.
310bea739ee1fac51d3f1db221d66f715bce9e829391ed0701992c620390aa02
Rejetto HttpFileServer (HFS) is vulnerable to remote command execution attack due to a poor regex in the file ParserLib.pas. This Metasploit module exploit the HFS scripting commands by using '%00' to bypass the filtering. This Metasploit module has been tested successfully on HFS 2.3b over Windows XP SP3, Windows 7 SP1 and Windows 8.
d93a3f4493d008291488a8f9c338e5bc4d1561a09f2e7cbaa2c9a044cfd8f541
HttpFileServer version 2.3c suffers from multiple cross site scripting vulnerabilities.
2feb5ccca4ab293462a18355f56ef10135b82ba084f052bcbb31f14e195f9380
HttpFileServer version 2.3.x suffers from a remote command execution vulnerability due to a poorly formed regex.
b3271bba3fc147d5debc54d8dbb9d30c83064441e55e54ba453b1f75c0faa5bc
HTTP File Server versions 2.2a and below and 2.3 beta and below suffer form a directory traversal vulnerability in file uploading.
4b3710f457633595f2cb9577aaa76fb204b3aa442a3917ce56c6b7ba3f6826f2