Description
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pxfv-7rr3-2qjg | copyparty vulnerable to path traversal attack |
References
History
Thu, 04 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
9001
9001 copyparty |
|
| CPEs | cpe:2.3:a:9001:copyparty:*:*:*:*:*:*:*:* | |
| Vendors & Products |
9001
9001 copyparty |
Fri, 18 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:01:27.796Z
Reserved: 2023-07-06T13:01:36.998Z
Link: CVE-2023-37474
Updated: 2024-08-02T17:16:30.840Z
Status : Modified
Published: 2023-07-14T20:15:09.083
Modified: 2025-09-04T13:04:46.710
Link: CVE-2023-37474
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA