Skip to content

HFS Exposure

ID: hfs-exposure

Severity: unknown

Author: tess

Tags: misconfig,hfs,exposure

id: hfs-exposure
info:
name: HFS Exposure
author: tess
severity: unknown
classification:
cpe: cpe:2.3:a:rejetto:http_file_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: rejetto
product: http_file_server
shodan-query: title:"HFS /"
tags: misconfig,hfs,exposure
http:
- method: GET
path:
- '{{BaseURL}}'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "HFS /"
- "Messages"
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4b0a00483046022100aac6d274a45e2c6b8285ecfa6a2b2fd42398c7a617e77c1a03273d46bb70aede022100c3d0abb1587f604b263f0724406031041a221d3abe66efe7c9e158c0d5ae57b2:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/hfs-exposure.yaml"

View on Github