CVE-2014-6287
KEV
🔴 Łataj teraz
Wykonanie dowolnych programów w Rejetto HTTP File Server umożliwia atak zdalny przez sekwencję %00.
CVSS
9.8
EPSS
94.4%
Exploit
weaponized
Vendor
rejetto
Opis źródłowy (NVD)
The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 94.4% |
| Opublikowano (NVD) | 2014-10-07 10:55:04 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 14:32:07 UTC |
Referencje
- http://packetstormsecurity.com/files/128243/HttpFileServer-2.3.x-Remote-Command-Execution.html (cve@mitre.org) [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/135122/Rejetto-HTTP-File-Server-2.3.x-Remote-Code-Execution.html (cve@mitre.org) [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/160264/Rejetto-HttpFileServer-2.3.x-Remote-Command-Execution.html (cve@mitre.org) [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/161503/HFS-HTTP-File-Server-2.3.x-Remote-Code-Execution.html (cve@mitre.org) [Exploit, Third Party Advisory, VDB Entry]
- http://www.kb.cert.org/vuls/id/251276 (cve@mitre.org) [Third Party Advisory, US Government Resource]
- https://github.com/rapid7/metasploit-framework/pull/3793 (cve@mitre.org) [Exploit]
- https://www.exploit-db.com/exploits/39161/ (cve@mitre.org) [Exploit, Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6287 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]