Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-8mx2-rjh8-q3jq: copyparty Reflected XSS via Filter Parameter

Summary

Unauthorized reflected Cross-Site-Scripting when accessing the URL for recent uploads with the filter parameter containing JavaScript code.

Details

When accessing the recent uploads page at /?ru, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a <script> block without proper escaping. This vulnerability allows for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users, enabling unwanted actions in the victims browser.

PoC

A URL like this will execute alert(1):

https://127.0.0.1:3923/?ru&filter=</script><script>alert(1)</script>
ghsa
#xss#vulnerability#git#java#auth

Summary

Unauthorized reflected Cross-Site-Scripting when accessing the URL for recent uploads with the filter parameter containing JavaScript code.

Details

When accessing the recent uploads page at /?ru, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a <script> block without proper escaping.
This vulnerability allows for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users, enabling unwanted actions in the victims browser.

PoC

A URL like this will execute alert(1):

https://127.0.0.1:3923/?ru&filter=</script><script>alert(1)</script>

References

  • GHSA-8mx2-rjh8-q3jq
  • 9001/copyparty@a8705e6
  • https://github.com/9001/copyparty/releases/tag/v1.18.7

ghsa: Latest News

GHSA-qc2h-74x3-4v3w: MaterialX Lack of MTLX Import Depth Limit Leads to DoS (Denial-Of-Service) Via Stack Exhaustion