CVE-2023-38501

MEDIUM NUCLEI

copyparty <1.8.7 - XSS

Title source: llm

Description

copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. Version 1.8.7 contains a patch for the issue.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Vartamtezidis Theodoros · textwebappspython
https://www.exploit-db.com/exploits/51635

Nuclei Templates (1)

CopyParty v1.8.6 - Cross Site Scripting
MEDIUMVERIFIEDby ctflearner,r3Y3r53
Shodan: title:"copyparty" || http.title:"copyparty"
FOFA: title="copyparty"

Scores

CVSS v3 6.3
EPSS 0.7963
EPSS Percentile 99.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Details

CWE
CWE-79
Status published
Products (2)
9001/copyparty < 1.8.7
pypi/copyparty 0 - 1.8.7PyPI
Published Jul 25, 2023
Tracked Since Feb 18, 2026