logo

CVE-2017-15054 nilsteampassnet/teampass

Package

Manager: composer
Name: nilsteampassnet/teampass
Vulnerable Version: >=0 <2.1.27.9

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0192 pctl0.82643

Details

TeamPass arbitrary file upload vulnerability An arbitrary file upload vulnerability, present in TeamPass before 2.1.27.9, allows remote authenticated users to upload arbitrary files leading to Remote Command Execution. To exploit this vulnerability, an authenticated attacker has to tamper with parameters of a request to upload.files.php, in order to select the correct branch and be able to upload any arbitrary file. From there, it can simply access the file to execute code on the server.

Metadata

Created: 2022-05-17T00:17:47Z
Modified: 2024-04-24T22:28:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rm3q-qfrm-frrv/GHSA-rm3q-qfrm-frrv.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-rm3q-qfrm-frrv
Finding: F027
Auto approve: 1