Description
Copyparty is a portable file server. In versions 1.18.6 and below, when accessing the recent uploads page at `/?ru`, users can filter the results using an input field at the top. This field appends a filter parameter to the URL, which reflects its value directly into a `<script>` block without proper escaping, allowing for reflected Cross-Site Scripting (XSS) and can be exploited against both authenticated and unauthenticated users. This is fixed in version 1.18.7.
Problem types
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Product status
References
github.com/...yparty/security/advisories/GHSA-8mx2-rjh8-q3jq
github.com/...ommit/a8705e611d05eeb22be5d3d7d9ab5c020fe54c62
github.com/9001/copyparty/releases/tag/v1.18.7