Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2516 PoC — TeamPass 跨站脚本漏洞

Source
Associated Vulnerability
Title:TeamPass 跨站脚本漏洞 (CVE-2023-2516)
Description:TeamPass是Nils Laumaillé个人开发者的一款开源的密码管理器。 TeamPass 3.0.7 之前版本存在跨站脚本漏洞,攻击者利用该漏洞可以将恶意代码注入共享文件夹,窃取用户凭据、破坏敏感数据的机密性。
Description
Medium Blog
Readme
# CVE-2023-2516: Stored XSS Vulnerability in Teampass 3.0.6 - M Nadeem Qazi

Hey everyone, I wanted to share with you a vulnerability that I discovered in Teampass, a password management software. I found a stored XSS vulnerability (CVE-2023-2516) that allows attackers to inject malicious code into shared folders, which can potentially lead to serious consequences such as theft of sensitive data or unauthorized access to systems.

## Vulnerability Details

- Vulnerability Type: Stored XSS
- CVE: CVE-2023-2516
- Software Version: Teampass 3.0.6
- Author: M Nadeem Qazi

### Description

If two users have permission to access a shared folder, an attacker can create a new item in the folder and insert an XSS payload into the item's field. When the item is saved, the payload is successfully implemented within the shared folder. Then, when another user opens the shared folder and clicks on the item, an XSS alert is activated.

### Proof of Concept (PoC)

[![PoC](https://img.youtube.com/vi/qctjMvaFUuA/0.jpg)](https://youtu.be/qctjMvaFUuA)

## Mitigation

I reported this vulnerability to the Teampass development team and it has been fixed in the latest version of the software. However, users should still take precautions to prevent exploitation, such as limiting access to shared folders and being cautious when opening links or files from untrusted sources.

## Additional Resources

If you're interested in learning more about my findings, check out the report link on [huntr.dev](https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716/).

You can also follow me for updates on my research and other security-related topics:

- Instagram: [@mnqazi](https://www.instagram.com/mnqazi)
- Twitter: [@mnqazi](https://twitter.com/mnqazi)
- Facebook: [@mnqazi](https://www.facebook.com/mnqazi)
- LinkedIn: [M_Nadeem_Qazi](https://www.linkedin.com/in/m-nadeem-qazi)

Stay safe out there!
File Snapshot

[4.0K] /data/pocs/eb8f29bd142abf99f6e18cd6ab287d04ab9e7e55 └── [1.9K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.