Miggo Logo

CVE-2023-3565: TeamPass Cross-site Scripting vulnerability

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.25762%
Published
7/10/2023
Updated
11/7/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
nilsteampassnet/teampasscomposer< 3.0.103.0.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The key vulnerability stemmed from improper input sanitization in the session extension feature. The commit shows the XSS fix specifically targeted the showExtendSession function by replacing direct .val() usage with a sanitization wrapper. While other input fields in options.php were hardened by switching to type='number', these represent HTML form improvements rather than vulnerable functions. The showExtendSession function's direct use of unsanitized user input in JavaScript execution context (via IncreaseSessionTime) provides a clear XSS vector that matches the CWE-79 description.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross-sit* S*riptin* (XSS) - **n*ri* in *it*u* r*pository nilst**mp*ssn*t/t**mp*ss prior to *.*.**.

Reasoning

T** k*y vuln*r**ility st*mm** *rom improp*r input s*nitiz*tion in t** s*ssion *xt*nsion ***tur*. T** *ommit s*ows t** XSS *ix sp**i*i**lly t*r**t** t** s*ow*xt*n*S*ssion *un*tion *y r*pl**in* *ir**t .v*l() us*** wit* * s*nitiz*tion wr*pp*r. W*il* ot*