Security
Headlines
HeadlinesLatestCVEs

Headline

Copyparty 1.8.6 Cross Site Scripting

Copyparty version 1.8.6 suffers from a cross site scripting vulnerability.

Packet Storm
#xss#vulnerability#web#linux#debian#git#java#auth
# Exploit Title: copyparty v1.8.6 - Reflected Cross Site Scripting (XSS)# Date: 23/07/2023# Exploit Author: Vartamtezidis Theodoros (@TheHackyDog)# Vendor Homepage: https://github.com/9001/copyparty/# Software Link: https://github.com/9001/copyparty/releases/tag/v1.8.6# Version: <=1.8.6# Tested on: Debian Linux# CVE : CVE-2023-38501#DescriptionCopyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack. Vulnerability that exists in the web interface of the application could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link.#POChttps://localhost:3923/?k304=y%0D%0A%0D%0A%3Cimg+src%3Dcopyparty+onerror%3Dalert(1)%3E

Related news

CVE-2023-38501: Reflected cross-site scripting via k304 parameter

copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. Version 1.8.7 contains a patch for the issue.

GHSA-f54q-j679-p9hh: Reflected cross-site scripting via k304 parameter

### Summary The application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...` ### Details A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the application that could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of your copyparty accounts, unless you have inspected your logs and found no trace of attacks. ### Checking for exposure if copyparty is running behind a reverse proxy, you can check the access-logs for traces of attacks, by grepping for URLs containing `?hc=` with `<` somewhere in its value, for example using the following command: * nginx: ```bash (gzip -dc access.log*.gz; cat access.log) | sed -r 's/" [0-9]+ .*//' | grep...

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution