Lucene search

K
githubGitHub Advisory DatabaseGHSA-H6JH-CF83-QCQ5
HistoryMay 24, 2023 - 9:30 a.m.

Code injection in nilsteampassnet/teampass

2023-05-2409:30:25
CWE-94
GitHub Advisory Database
github.com
1
code injection
folder rename
admin interaction
unauthorized access
sensitive information
website redirection

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

61.1%

nilsteampassnet/teampass prior to 3.0.9 is vulnerable to code injection. A malicious user could potentially rename a folder with a payload containing malicious code. This could result in an attack on an admin who edits the folder, as the payload could execute upon the admin’s interaction with the folder. This attack could potentially allow the attacker to gain unauthorized access to the admin’s system or steal sensitive information, or it could force admin to get redirected to a website controlled by the attacker.

Affected configurations

Vulners
Node
nilsteampassnetteampassRange<3.0.9
CPENameOperatorVersion
nilsteampassnet/teampasslt3.0.9

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

61.1%