Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2023-37474 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A **Path Traversal** flaw in Copyparty. πŸ“‚ Attackers access files **outside** the web root via the `.cpr` subfolder.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-22**: Improper Limitation of a Pathname to a Restricted Directory. πŸ› **Flaw**: The application fails to sanitize user input for the `.cpr` endpoint, allowing `../` sequences to escape the intended directory.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users running **Copyparty** (portable file server by ed). πŸ“‰ **Versions**: All versions **prior to 1.8.2**. 🏷️ **Vendor**: 9001.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges**: Attacker gains **Read-Only** access to arbitrary files. πŸ“„ **Data**: Can view config files, logs, or other sensitive data residing outside the document root.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: Likely **Low**. Path traversal often requires no authentication if the `.cpr` endpoint is publicly accessible.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exp?**: **YES**. PoCs available on GitHub (e.g., `ilqarli27/CVE-2023-37474`) and Nuclei templates. πŸš€ **Wild Exploitation**: High risk due to easy-to-use automated scanning tools.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Copyparty instances. πŸ§ͺ **Test**: Send requests with `../` payloads to the `.cpr` subfolder. πŸ“‘ **Tools**: Use Nuclei templates (`http/cves/2023/CVE-2023-37474.yaml`) for automated detection.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **YES**. Patched in **Version 1.8.2**. πŸ”— **Commit**: `043e3c7d`. πŸ“’ **Action**: Upgrade immediately to the latest stable version.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: **No known workarounds** officially listed. πŸ›‘ **Mitigation**: Restrict network access to the Copyparty instance.…

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **HIGH**. πŸ“… **Published**: July 2023. 🚨 **Priority**: Critical for exposed servers. Public exploits exist. Upgrade ASAP to prevent data theft.