6.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
0.002 Low
EPSS
Percentile
59.5%
The application contains a reflected cross-site scripting via URL-parameter ?k304=...
and ?setck=...
A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the application that could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link.
The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link.
It is recommended to change the passwords of your copyparty accounts, unless you have inspected your logs and found no trace of attacks.
if copyparty is running behind a reverse proxy, you can check the access-logs for traces of attacks, by grepping for URLs containing ?hc=
with <
somewhere in its value, for example using the following command:
(gzip -dc access.log*.gz; cat access.log) | sed -r 's/" [0-9]+ .*//' | grep -iE '%0[da]%0[da]%0[da]%0[da]|[?&](hc|pw)=.*[<>]'
the above commands also check for attacks against GHSA-cw7j-v52w-fp5r
https://localhost:3923/?k304=y%0D%0A%0D%0A%3Cimg+src%3Dcopyparty+onerror%3Dalert(1)%3E
packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html
github.com/9001/copyparty
github.com/9001/copyparty/commit/007d948cb982daa05bc6619cd20ee55b7e834c38
github.com/9001/copyparty/releases/tag/v1.8.7
github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh
github.com/pypa/advisory-database/tree/main/vulns/copyparty/PYSEC-2023-132.yaml
nvd.nist.gov/vuln/detail/CVE-2023-38501