copyparty Reflected XSS via Filter Parameter

链接: https://github.com/advisories/GHSA-8mx2-rjh8-q3jq

仓库 Star: 15651

CVSS 评分: 6.3

参考链接:

描述:

Summary

Unauthorized reflected Cross-Site-Scripting when accessing the URL for recent uploads with the filter parameter containing JavaScript code.

Details

When accessing the recent uploads page at /?ru, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a <script> block without proper escaping.
This vulnerability allows for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users, enabling unwanted actions in the victims browser.

PoC

A URL like this will execute alert(1):

1
https://127.0.0.1:3923/?ru&filter=</script><script>alert(1)</script>

copyparty Reflected XSS via Filter Parameter
http://example.com/2025/07/31/github_921509101/
作者
lianccc
发布于
2025年7月31日
许可协议