TeamPass 'login' Field HTML Injection Vulnerability
BID:53038
Info
TeamPass 'login' Field HTML Injection Vulnerability
| Bugtraq ID: | 53038 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-2234 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 17 2012 12:00AM |
| Updated: | Apr 17 2012 12:00AM |
| Credit: | Marcos Garcia |
| Vulnerable: |
TeamPass TeamPass 2.1.5 |
| Not Vulnerable: |
TeamPass TeamPass 2.1.6 |
Discussion
TeamPass 'login' Field HTML Injection Vulnerability
TeamPass is prone to an HTML-injection vulnerability because it fails to sanitize user-supplied input.
Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible.
TeamPass 2.1.5 is vulnerable; other versions may also be affected.
TeamPass is prone to an HTML-injection vulnerability because it fails to sanitize user-supplied input.
Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible.
TeamPass 2.1.5 is vulnerable; other versions may also be affected.
Exploit / POC
TeamPass 'login' Field HTML Injection Vulnerability
Attackers can exploit this issue using a browser.
The following example data is available:
POST /TeamPass/sources/users.queries.php HTTP/1.1
type=add_new_user&login=[XSS]&pw=testing2&email=test&admin=false&manager=true&read_only=false&personal_folder=false&new_folder_role_domain=false&domain=test&key=key
Attackers can exploit this issue using a browser.
The following example data is available:
POST /TeamPass/sources/users.queries.php HTTP/1.1
type=add_new_user&login=[XSS]&pw=testing2&email=test&admin=false&manager=true&read_only=false&personal_folder=false&new_folder_role_domain=false&domain=test&key=key
Solution / Fix
TeamPass 'login' Field HTML Injection Vulnerability
Solution:
Updates are available. Please contact the vendor for more information.
Solution:
Updates are available. Please contact the vendor for more information.