Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-23692— Rejetto HTTP File Server 2.3m Unauthenticated RCE

CVSS 9.8 · Critical KEV EPSS 94.30% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-23692

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Rejetto HTTP File Server 2.3m Unauthenticated RCE
Source: NVD (National Vulnerability Database)
Vulnerability Description
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1336
Source: NVD (National Vulnerability Database)
Vulnerability Title
Rejetto HTTP File Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Rejetto HTTP File Server(Rejetto HFS)是Rejetto公司的一款 HTTP 文件服务器。 Rejetto HTTP File Server 2.3m及之前版本存在安全漏洞,该漏洞源于存在模板注入漏洞,允许远程未经身份验证的攻击者通过发送特制的HTTP请求在受影响的系统上执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
RejettoHTTP File Server 0 ~ 2.3m -

II. Public POCs for CVE-2024-23692

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/k3lpi3b4nsh33/CVE-2024-23692POC Details
2Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)https://github.com/jakabakos/CVE-2024-23692-RCE-in-Rejetto-HFSPOC Details
3Nonehttps://github.com/vanboomqi/CVE-2024-23692POC Details
4Nonehttps://github.com/WanLiChangChengWanLiChang/CVE-2024-23692-RCEPOC Details
5Nonehttps://github.com/Mr-r00t11/CVE-2024-23692POC Details
6CVE-2024-23692 exphttps://github.com/Tupler/CVE-2024-23692-expPOC Details
7CVE-2024-23692https://github.com/BBD-YZZ/CVE-2024-23692POC Details
8CVE-2024-23692 Exploithttps://github.com/0x20c/CVE-2024-23692-EXPPOC Details
9Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE exploit module (CVE-2024-23692)https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692-POC Details
10Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE exploit module (CVE-2024-23692)https://github.com/pradeepboo/Rejetto-HFS-2.x-RCE-CVE-2024-23692POC Details
11POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 https://github.com/verylazytech/CVE-2024-23692POC Details
12CVE-2024-23692 是影响 Rejetto HTTP File Server(HFS)2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。https://github.com/XiaomingX/CVE-2024-23692-pocPOC Details
13CVE-2024-23692 是影响 Rejetto HTTP File Server(HFS)2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。https://github.com/XiaomingX/cve-2024-23692-pocPOC Details
14HFS2.3未经身份验证的远程代码执行(CVE-2024-23692)https://github.com/NingXin2002/HFS2.3_pocPOC Details
15HFS 2.3m SERVER RCE Vulnerability exploithttps://github.com/999gawkboyy/CVE-2024-23692_ExploitPOC Details
16This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-23692.yamlPOC Details
17Nonehttps://github.com/NanoWraith/CVE-2024-23692POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-23692

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-23692

No comments yet


Leave a comment