copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. Version 1.8.7 contains a patch for the issue.
History

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-13T17:01:52.251Z

Reserved: 2023-07-18T16:28:12.077Z

Link: CVE-2023-38501

cve-icon Vulnrichment

Updated: 2024-08-02T17:46:55.179Z

cve-icon NVD

Status : Modified

Published: 2023-07-25T22:15:10.600

Modified: 2024-11-21T08:13:42.400

Link: CVE-2023-38501

cve-icon Redhat

No data.