Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8mx2-rjh8-q3jq

Опубликовано: 31 июл. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.3

Описание

copyparty Reflected XSS via Filter Parameter

Summary

Unauthorized reflected Cross-Site-Scripting when accessing the URL for recent uploads with the filter parameter containing JavaScript code.

Details

When accessing the recent uploads page at /?ru, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a <script> block without proper escaping. This vulnerability allows for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users, enabling unwanted actions in the victims browser.

PoC

A URL like this will execute alert(1):

https://127.0.0.1:3923/?ru&filter=</script><script>alert(1)</script>

Пакеты

Наименование

copyparty

pip
Затронутые версииВерсия исправления

<= 1.18.6

1.18.7

EPSS

Процентиль: 70%
0.00619
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.3
nvd
6 месяцев назад

Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.

EPSS

Процентиль: 70%
0.00619
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-79