Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_114299
HistoryJun 14, 2024 - 12:00 a.m.

Rejetto HTTP File Server 2.x Remote Code Execution

2024-06-1400:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
1
rejetto http file server
remote code execution
vulnerability
scanner

8.4 High

AI Score

Confidence

Low

Rejetto HTTP File Server 2.x, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request.

No source data

8.4 High

AI Score

Confidence

Low