Vulnerability Details : CVE-2014-7226
The file comment feature in Rejetto HTTP File Server (hfs) 2.3c and earlier allows remote attackers to execute arbitrary code by uploading a file with certain invalid UTF-8 byte sequences that are interpreted as executable macro symbols.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2014-7226
Probability of exploitation activity in the next 30 days: 29.11%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-7226
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-7226
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-7226
-
http://www.securityfocus.com/bid/70216
HTTP File Server CVE-2014-7226 Remote Command Execution Vulnerability
-
http://packetstormsecurity.com/files/128532/HTTP-File-Server-2.3a-2.3b-2.3c-Remote-Command-Execution.html
HTTP File Server 2.3a / 2.3b / 2.3c Remote Command Execution ≈ Packet StormExploit
-
http://www.rejetto.com/forum/hfs-~-http-file-server/new-version-2-3d/
New version: 2.3dVendor Advisory
-
http://www.exploit-db.com/exploits/34852
Rejetto HTTP File Server (HFS) 2.3a/2.3b/2.3c - Remote Command Execution - Windows webapps ExploitExploit
Products affected by CVE-2014-7226
- cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:*