.. / CVE-2023-37474

Exploit for Copyparty <= 1.8.2 - Directory Traversal (CVE-2023-37474)

Description:

Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the .cpr subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit 043e3c7d which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Nuclei Template

View the template here CVE-2023-37474.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-37474.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2023-37474
https://github.com/9001/copyparty/
http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html
https://github.com/9001/copyparty/commit/043e3c7dd683113e2b1c15cacb9c8e68f76513ff
https://www.exploit-db.com/exploits/51636