-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| copyparty | pip | <= 1.8.6 | 1.8.7 |
The vulnerability stems from improper input sanitization in cookie generation. The commit diff shows:
Before patching, set_k304 used raw user input from the 'k304' parameter to create cookies via gencookie(), allowing attackers to inject newlines (%0D%0A) to break HTTP headers and inject malicious HTML/JS into the response body. The PoC demonstrates this by injecting <img> tags through newline-separated headers.
A Semantic Attack on Google Gemini - Read the Latest Research