HTTP: ES File Explorer File Manager Policy Bypass

This signature detects attempts to exploit a known vulnerability against ES File Explorer manager. A successful attack can lead to security bypass.

Extended Description

The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.

Affected Products

Estrongs es_file_explorer_file_manager

References

CVE: CVE-2019-6447

Short Name
HTTP:MISC:FL-EXPLRER-MNGR-BYPAS
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Bypass CVE-2019-6447 ES Explorer File Manager Policy
Release Date
10/11/2022
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3822
False Positive
Rarely
Vendors

Estrongs

Found a potential security threat?