CVE-2014-3772

TeamPass before 2.1.20 allows remote attackers to bypass access restrictions via a request to index.php followed by a direct request to a file that calls the session_start function before checking the CPM key, as demonstrated by a request to sources/upload/upload.files.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:teampass:teampass:*:beta:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.13:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.14:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.15:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.18:*:*:*:*:*:*:*
cpe:2.3:a:teampass:teampass:2.1.19:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://teampass.net/installation/2.1.20-released.html - Vendor Advisory () http://teampass.net/installation/2.1.20-released.html - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2014/05/18/2 - () http://www.openwall.com/lists/oss-security/2014/05/18/2 -
References () http://www.openwall.com/lists/oss-security/2014/05/19/5 - () http://www.openwall.com/lists/oss-security/2014/05/19/5 -
References () https://github.com/nilsteampassnet/TeamPass/commit/7715512f2bd5659cc69e063a1c513c19e384340f - Exploit, Patch () https://github.com/nilsteampassnet/TeamPass/commit/7715512f2bd5659cc69e063a1c513c19e384340f - Exploit, Patch

Information

Published : 2014-08-07 11:13

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3772

Mitre link : CVE-2014-3772

CVE.ORG link : CVE-2014-3772


JSON object : View

Products Affected

teampass

  • teampass
CWE
CWE-264

Permissions, Privileges, and Access Controls