CVE-2023-2591 – nilsteampassnet/teampass
Package
Manager: composer
Name: nilsteampassnet/teampass
Vulnerable Version: >=0 <3.0.7
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00282 pctl0.51189
Details
teampass vulnerable to code injection In nilsteampassnet/teampass prior to 3.0.7, if two users have the same folder access, malicious users can create an item where its label field is vulnerable to HTML injection. When other users see that item, it may force them to redirect to the attacker's website or capture their data using a form. The issue is fixed in version 3.0.7.
Metadata
Created: 2023-05-09T12:30:22Z
Modified: 2023-05-10T12:50:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-prj5-2g2p-x2mw/GHSA-prj5-2g2p-x2mw.json
CWE IDs: ["CWE-79", "CWE-94"]
Alternative ID: GHSA-prj5-2g2p-x2mw
Finding: F188
Auto approve: 1