Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
References
| Link | Resource |
|---|---|
| https://github.com/rapid7/metasploit-framework/pull/19240 | Exploit Issue Tracking Patch |
| https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/ | Exploit |
| https://vulncheck.com/advisories/rejetto-unauth-rce | Third Party Advisory |
| https://github.com/rapid7/metasploit-framework/pull/19240 | Exploit Issue Tracking Patch |
| https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/ | Exploit |
| https://vulncheck.com/advisories/rejetto-unauth-rce | Third Party Advisory |
| https://www.vicarius.io/vsociety/posts/cve-2024-23692-detect-rejetto-hfs-vulnerability | Exploit Third Party Advisory |
| https://www.vicarius.io/vsociety/posts/cve-2024-23692-rejetto-hfs-mitigate-vulnerability | Exploit Third Party Advisory |
| https://www.vicarius.io/vsociety/posts/unauthenticated-rce-flaw-in-rejetto-http-file-server-cve-2024-23692 | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23692 |
Configurations
History
21 Oct 2025, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Jun 2025, 15:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.vicarius.io/vsociety/posts/cve-2024-23692-detect-rejetto-hfs-vulnerability - Exploit, Third Party Advisory | |
| References | () https://www.vicarius.io/vsociety/posts/cve-2024-23692-rejetto-hfs-mitigate-vulnerability - Exploit, Third Party Advisory |
17 Jun 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jan 2025, 21:43
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/rapid7/metasploit-framework/pull/19240 - Exploit, Issue Tracking, Patch | |
| References | () https://vulncheck.com/advisories/rejetto-unauth-rce - Third Party Advisory | |
| References | () https://www.vicarius.io/vsociety/posts/unauthenticated-rce-flaw-in-rejetto-http-file-server-cve-2024-23692 - Exploit, Third Party Advisory |
21 Nov 2024, 08:58
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://github.com/rapid7/metasploit-framework/pull/19240 - Exploit, Issue Tracking | |
| References | () https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/ - Exploit | |
| References | () https://vulncheck.com/advisories/rejetto-unauth-rce - Exploit, Third Party Advisory |
14 Aug 2024, 16:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://vulncheck.com/advisories/rejetto-unauth-rce - Exploit, Third Party Advisory |
10 Jul 2024, 14:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/rapid7/metasploit-framework/pull/19240 - Exploit, Issue Tracking | |
| References | () https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/ - Exploit | |
| References | () https://vulncheck.com/advisories/rejetto-unauth-rce - Third Party Advisory | |
| CWE | CWE-94 | |
| First Time |
Rejetto
Rejetto http File Server |
|
| CPE | cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:* |
07 Jun 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
06 Jun 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
31 May 2024, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-31 10:15
Updated : 2025-10-21 23:16
NVD link : CVE-2024-23692
Mitre link : CVE-2024-23692
CVE.ORG link : CVE-2024-23692
JSON object : View
Products Affected
rejetto
- http_file_server
