GHSA-cw7j-v52w-fp5r: copyparty vulnerable to reflected cross-site scripting via hc parameter
6.3
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
7/21/2023
Updated
9/4/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
copyparty | pip | < 1.8.6 | 1.8.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows the vulnerability was in httpcli.py
's tx_svcs method where: 1) The 'hc' parameter was accessed via self.uparam["hc"] 2) It was only .lstrip("/") with no XSS protection 3) The parameter value was passed into a Jinja template (self.j2s("svcs")
) 4) The fix added regex substitution to neutralize dangerous characters. The unescaped insertion of user-controlled hc parameter into HTML output directly matches the XSS vulnerability described in the advisory.