copyparty Reflected XSS via Filter Parameter
链接: https://github.com/advisories/GHSA-8mx2-rjh8-q3jq
仓库 Star: 15651
CVSS 评分: 6.3
参考链接:
https://github.com/9001/copyparty/security/advisories/GHSA-8mx2-rjh8-q3jq
https://github.com/9001/copyparty/commit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62
描述:
Summary
Unauthorized reflected Cross-Site-Scripting when accessing the URL for recent uploads with the filter
parameter containing JavaScript code.
Details
When accessing the recent uploads page at /?ru
, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a <script>
block without proper escaping.
This vulnerability allows for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users, enabling unwanted actions in the victims browser.
PoC
A URL like this will execute alert(1)
:
1 |
|