HFS Exec Launcher Plugin for Windows
Launch executable files on the server directly from HTTP File Server version 3 (HFS 3) web interface
This plugin allows administrators and trusted users to launch executable files (.exe, .cmd, .bat) on HTTP File Server version 3 (HFS 3) directly from its web interface. The solution works exclusively on Windows and includes a multi-layered security system for access control.
- Flexible Access Control:
- Restrictions by groups/users.
- Configurable for HFS administrators only or all users.
- Secure Execution:
- Filtering by allowed extensions (configurable).
- Path restrictions for execution in VFS and the physical file system.
- Protection against injections, symlinks, UNC paths, and path traversal.
- Operation Modes:
- Detached process launch for interactive consoles.
- Hidden console mode (terminates with HFS).
- Execution under the account running HFS.
- Monitoring:
- Logging user name and parent process PID details.
- Success/error notifications in the web interface.
- "Run on server" appears in file context menus (if execution is permitted based on all security criteria).
- Result: Toast notification with PID and file path.
- Path Filtering:
- Blocks relative paths (
..), symlinks, UNC paths. - Strict binding to
physicalPath.
- Blocks relative paths (
- Command Sanitization: Removes dangerous symbols (
&,|,>,<). - Checks:
- File extension.
- VFS/physical path validity.
- User/group permissions.
- For your awareness:
- Acknowledge that most security relies on HFS VFS.
- Don't allow HFS to be used without HTTPS for accounts with file execution permissions.
- Change passwords regularly.
- For public/non-home use:
- Restrict Windows account permissions for HFS (including full NTFS control).
- Avoid non-standard Windows characters (
%,", etc.) in script paths/names. - Implement signature verification for
cmd,exe, and similar files using PowerShell or SignTool. - Disable public uploads to VFS/NTFS script folders.
- Use non-default confidential paths (not
C:\scriptsor/hfs-scripts). - Set
can_see/can_listonly for required groups/users. - Use Virtual Folders to isolate/hide sensitive content.
- Monitor for
cmd.exe0-day exploits.
- Stopping/restarting services, apps, OS.
- Modifying software/OS configurations.
- Generating one-time tokens/passwords/2FA.
- Creating user accounts.
- Running PowerShell scripts.
- Wake-on-LAN.
- Launching compilations/conversions with I/O in VFS folders.
- Managing Windows Task Scheduler.
- Using as a
cmdterminal: Send input scripts → execute → capture output via>>out.txt.
- Backend:
- Uses
child_process.spawn. - Detailed execution logs in HFS console.
- Uses
- Frontend:
- Dynamically adds file menu buttons after full permission verification.
- Requests via
customRestCall.
- Windows only.
- Requires HFS API version 12.3+.
- Copy the hfs-exec-launcher folder to HFS plugins directory.
- Enable the plugin in the HFS admin panel.
- Configure settings in Options.
- Strictly define access rights using HFS VFS tools.
Support:
- BTC:
bc1qeuq7s8w0x7ma59mwd4gtj7e9rjl2g9xqvxdsl6 - TON:
UQAOQXGtTi_aM1u54aQjb8QiXZkQdaL9MDSky5LHN0F5-yF2

