CVE-2017-15052

TeamPass before 2.1.27.9 does not properly enforce manager access control when requesting users.queries.php. It is then possible for a manager user to delete an arbitrary user (including admin), or modify attributes of any arbitrary user except administrator. To exploit the vulnerability, an authenticated attacker must have the manager rights on the application, then tamper with the requests sent directly, for example by changing the "id" parameter when invoking "delete_user" on users.queries.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:14

Type Values Removed Values Added
References () http://blog.amossys.fr/teampass-multiple-cve-01.html - Exploit, Technical Description, Third Party Advisory () http://blog.amossys.fr/teampass-multiple-cve-01.html - Exploit, Technical Description, Third Party Advisory
References () https://github.com/nilsteampassnet/TeamPass/commit/8f2d51dd6c24f76e4f259d0df22cff9b275f2dd1 - Patch () https://github.com/nilsteampassnet/TeamPass/commit/8f2d51dd6c24f76e4f259d0df22cff9b275f2dd1 - Patch

Information

Published : 2017-11-27 19:29

Updated : 2024-11-21 03:14


NVD link : CVE-2017-15052

Mitre link : CVE-2017-15052

CVE.ORG link : CVE-2017-15052


JSON object : View

Products Affected

teampass

  • teampass
CWE
CWE-269

Improper Privilege Management