This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A **Path Traversal** flaw in Copyparty. π Attackers access files **outside** the web root via the `.cpr` subfolder.β¦
π‘οΈ **CWE-22**: Improper Limitation of a Pathname to a Restricted Directory. π **Flaw**: The application fails to sanitize user input for the `.cpr` endpoint, allowing `../` sequences to escape the intended directory.
Q3Who is affected? (Versions/Components)
π₯ **Affected**: Users running **Copyparty** (portable file server by ed). π **Versions**: All versions **prior to 1.8.2**. π·οΈ **Vendor**: 9001.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Privileges**: Attacker gains **Read-Only** access to arbitrary files. π **Data**: Can view config files, logs, or other sensitive data residing outside the document root.β¦
π₯ **Public Exp?**: **YES**. PoCs available on GitHub (e.g., `ilqarli27/CVE-2023-37474`) and Nuclei templates. π **Wild Exploitation**: High risk due to easy-to-use automated scanning tools.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for Copyparty instances. π§ͺ **Test**: Send requests with `../` payloads to the `.cpr` subfolder. π‘ **Tools**: Use Nuclei templates (`http/cves/2023/CVE-2023-37474.yaml`) for automated detection.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed**: **YES**. Patched in **Version 1.8.2**. π **Commit**: `043e3c7d`. π’ **Action**: Upgrade immediately to the latest stable version.
Q9What if no patch? (Workaround)
π§ **No Patch?**: **No known workarounds** officially listed. π **Mitigation**: Restrict network access to the Copyparty instance.β¦
β‘ **Urgency**: **HIGH**. π **Published**: July 2023. π¨ **Priority**: Critical for exposed servers. Public exploits exist. Upgrade ASAP to prevent data theft.