diff --git a/http/cves/2023/CVE-2023-37474.yaml b/http/cves/2023/CVE-2023-37474.yaml index 6bfdfe313f..02931d6a62 100644 --- a/http/cves/2023/CVE-2023-37474.yaml +++ b/http/cves/2023/CVE-2023-37474.yaml @@ -2,7 +2,7 @@ id: CVE-2023-37474 info: name: Copyparty <= 1.8.2 - Directory Traversal - author: theamanrawat + author: shankar acharya,theamanrawat severity: high description: | Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. @@ -16,8 +16,11 @@ info: cve-id: CVE-2023-37474 cwe-id: CWE-22 metadata: - verified: "true" - tags: cve,cve2023,directory-traversal,copyparty,unauthenticated + max-request: 1 + vendor: copyparty + product: copyparty + verified: true + tags: cve,cve2023,traversal,copyparty http: - method: GET