Wiz Agents & Workflows are here

CVE-2020-13432
Rejetto HFS vulnerability analysis and mitigation

Overview

rejetto HFS (aka HTTP File Server) v2.3m Build #300, when virtual files or folders are used, allows remote attackers to trigger an invalid-pointer write access violation via concurrent HTTP requests with a long URI or long HTTP headers like Cookie, User-Agent etc. The vulnerability was discovered in May 2020 and assigned CVE-2020-13432. The issue affects HFS v2.3m Build #300 and requires at least one saved virtual file or folder to be present on the target system (Hyp3rlinx Advisory).

Technical details

The vulnerability allows remote unauthenticated attackers to send concurrent HTTP requests using an incrementing or specific payload range of junk characters for values in the URL parameters or HTTP headers sent to the server. This results in an invalid pointer write access violation causing the hfs.exe server to crash. The issue was classified as 'EXPLOITABLE' according to Microsoft's !exploitable debugger extension, with the bug manifesting as a User Mode Write Access Violation (Hyp3rlinx Advisory).

Impact

Successful exploitation of this vulnerability results in a denial of service condition by crashing the HFS server process. The attack can be performed remotely by an unauthenticated attacker, making it particularly dangerous for exposed servers (Hyp3rlinx Advisory).

Mitigation and workarounds

The vendor released version 2.4 on June 7, 2020, which addresses this vulnerability. Users are advised to upgrade to the latest version. Additionally, the vendor has now indicated that version 2.3-2.4 should not be used anymore due to security vulnerabilities, and users should migrate to version 3 which is not affected by this issue (Rejetto Website).

Additional resources


SourceThis report was generated using AI

Related Rejetto HFS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-23692CRITICAL9.8
  • Rejetto HFSRejetto HFS
  • cpe:2.3:a:rejetto:http_file_server
YesYesMay 31, 2024
CVE-2024-39943HIGH8.8
  • JavaScriptJavaScript
  • hfs
NoYesJul 04, 2024
CVE-2024-1226HIGH7.5
  • Rejetto HFSRejetto HFS
  • cpe:2.3:a:rejetto:http_file_server
NoYesMar 12, 2024
CVE-2020-13432HIGH7.5
  • Rejetto HFSRejetto HFS
  • cpe:2.3:a:rejetto:http_file_server
NoYesJun 08, 2020
CVE-2024-1227MEDIUM6.5
  • Rejetto HFSRejetto HFS
  • cpe:2.3:a:rejetto:http_file_server
NoYesMar 12, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management