Miggo Logo

CVE-2017-15051: TeamPass stored cross-site scripting (XSS) vulnerability

5.4

CVSS Score
3.0

Basic Information

EPSS Score
0.36537%
Published
5/17/2022
Updated
4/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
nilsteampassnet/teampasscomposer< 2.1.27.92.1.27.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The patch adds FILTER_SANITIZE_STRING filtering to URL/login fields in items.queries.php, indicating these were unsanitized input vectors. The vulnerability description explicitly mentions these two injection points (item URL and user log history). The commit shows historical data was rendered with htmlspecialchars_decode() without output encoding in log display logic, and the user profile -> admin log flow matches the second attack vector described.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Multipl* stor** *ross-sit* s*riptin* (XSS) vuln*r**iliti*s in T**mP*ss ***or* *.*.**.* *llow *ut**nti**t** r*mot* *tt**k*rs to inj**t *r*itr*ry w** s*ript or *TML vi* t** (*) URL v*lu* o* *n it*m or (*) us*r lo* *istory. To *xploit t** vuln*r**ility,

Reasoning

T** p*t** ***s *ILT*R_S*NITIZ*_STRIN* *ilt*rin* to URL/lo*in *i*l*s in it*ms.qu*ri*s.p*p, in*i**tin* t**s* w*r* uns*nitiz** input v**tors. T** vuln*r**ility **s*ription *xpli*itly m*ntions t**s* two inj**tion points (it*m URL *n* us*r lo* *istory). T