Skip to content

Commit dbcd13a

Browse files
1 parent 32635bd commit dbcd13a

2 files changed

Lines changed: 138 additions & 0 deletions

File tree

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-62cr-6wp5-q43h",
4+
"modified": "2026-02-26T22:33:46Z",
5+
"published": "2026-02-26T22:33:46Z",
6+
"aliases": [
7+
"CVE-2026-27948"
8+
],
9+
"summary": "Copyparty vulnerable to reflected XSS via setck parameter",
10+
"details": "### Summary\nAn XSS allows for reflected cross-site scripting via URL-parameter `?setck=...`\n\n### Details\nA reflected cross-site scripting (XSS) vulnerability could allow an attacker to execute malicious javascript by tricking users into accessing a malicious link.\n\nThe worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link.\n\n### Indicators of Compromise\nAll attempted attacks (successful or not) would be logged to both the copyparty serverlog and the accesslog of the reverseproxy, and are detected by `grep -E '[?&]setck=[^&\"]*%'` (the text `setck=` eventually followed by the `%` character).",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "copyparty"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.20.9"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/9001/copyparty/security/advisories/GHSA-62cr-6wp5-q43h"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27948"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/9001/copyparty/commit/31b2801fd041f803f4a3d5c12c7d7cb5419048bc"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/9001/copyparty"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/9001/copyparty/releases/tag/v1.20.9"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-79"
63+
],
64+
"severity": "MODERATE",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-02-26T22:33:46Z",
67+
"nvd_published_at": "2026-02-26T02:16:22Z"
68+
}
69+
}
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fj3w-jwp8-x2g3",
4+
"modified": "2026-02-26T22:33:10Z",
5+
"published": "2026-02-26T22:33:10Z",
6+
"aliases": [
7+
"CVE-2026-27942"
8+
],
9+
"summary": "fast-xml-parser has stack overflow in XMLBuilder with preserveOrder",
10+
"details": "### Impact\nApplication crashes with stack overflow when user use XML builder with `prserveOrder:true` for following or similar input:\n\n```\n[{\n 'foo': [\n { 'bar': [{ '@_V': 'baz' }] }\n ]\n}]\n```\n\nCause: `arrToStr` was not validating if the input is an array or a string and treating all non-array values as text content.\n_What kind of vulnerability is it? Who is impacted?_\n\n### Patches\nYes, in 5.3.8.\n\n### Workarounds\nUse XML builder with `preserveOrder:false` or check the input data before passing to builder.\n\n### References\n[_Are there any links users can visit to find out more?_](https://github.com/NaturalIntelligence/fast-xml-parser/pull/791)",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "fast-xml-parser"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "5.3.8"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-fj3w-jwp8-x2g3"
42+
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27942"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/NaturalIntelligence/fast-xml-parser/pull/791"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/c13a961910f14986295dd28484eee830fa1a0e8a"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/NaturalIntelligence/fast-xml-parser"
58+
}
59+
],
60+
"database_specific": {
61+
"cwe_ids": [
62+
"CWE-120"
63+
],
64+
"severity": "LOW",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-02-26T22:33:10Z",
67+
"nvd_published_at": "2026-02-26T02:16:22Z"
68+
}
69+
}

0 commit comments

Comments
 (0)