module

Rejetto HTTP File Server (HFS) Unauthenticated Remote Code Execution

Disclosed
May 25, 2024
Created
Jun 11, 2024

Description

The Rejetto HTTP File Server (HFS) version 2.x is vulnerable to an unauthenticated server side template
injection (SSTI) vulnerability. A remote unauthenticated attacker can execute code with the privileges
of the user account running the HFS.exe server process. This exploit has been tested to work against version
2.4.0 RC7 and 2.3m. The Rejetto HTTP File Server (HFS) version 2.x is no longer supported by the maintainers
and no patch is available. Users are recommended to upgrade to newer supported versions.

Authors

sfewer-r7
Arseniy Sharoglazov

Platform

Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/http/rejetto_hfs_rce_cve_2024_23692
msf exploit(rejetto_hfs_rce_cve_2024_23692) > show targets
...targets...
msf exploit(rejetto_hfs_rce_cve_2024_23692) > set TARGET < target-id >
msf exploit(rejetto_hfs_rce_cve_2024_23692) > show options
...show and set options...
msf exploit(rejetto_hfs_rce_cve_2024_23692) > exploit

Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.