Miggo Logo

GHSA-cw7j-v52w-fp5r: copyparty vulnerable to reflected cross-site scripting via hc parameter

6.3

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
7/21/2023
Updated
9/4/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
copypartypip< 1.8.61.8.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows the vulnerability was in httpcli.py's tx_svcs method where: 1) The 'hc' parameter was accessed via self.uparam["hc"] 2) It was only .lstrip("/") with no XSS protection 3) The parameter value was passed into a Jinja template (self.j2s("svcs")) 4) The fix added regex substitution to neutralize dangerous characters. The unescaped insertion of user-controlled hc parameter into HTML output directly matches the XSS vulnerability described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T** *ppli**tion *ont*ins * r**l**t** *ross-sit* s*riptin* vi* URL-p*r*m*t*r `?**=...` ### **t*ils * r**l**t** *ross-sit* s*riptin* (XSS) vuln*r**ility *xists in t** w** int*r**** o* t** *ppli**tion t**t *oul* *llow *n *tt**k*r to *x**ut*

Reasoning

T** *ommit *i** s*ows t** vuln*r**ility w*s in `*ttp*li.py`'s tx_sv*s m*t*o* w**r*: *) T** '**' p*r*m*t*r w*s ****ss** vi* s*l*.up*r*m["**"] *) It w*s only .lstrip("/") wit* no XSS prot**tion *) T** p*r*m*t*r v*lu* w*s p*ss** into * Jinj* t*mpl*t* (`