Vulnerabilities
Vulnerable Software
Teampass:  >> Teampass  >> 2.1.27.36  Security Vulnerabilities
The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.
CVSS Score
7.5
EPSS Score
0.008
Published
2020-04-29
TeamPass 2.1.27.36 allows an unauthenticated attacker to retrieve files from the TeamPass web root. This may include backups or LDAP debug files.
CVSS Score
7.5
EPSS Score
0.237
Published
2020-04-29
TeamPass 2.1.27.36 allows any authenticated TeamPass user to trigger a PHP file include vulnerability via a crafted HTTP request with sources/users.queries.php newValue directory traversal.
CVSS Score
8.8
EPSS Score
0.024
Published
2020-04-29
TeamPass 2.1.27.36 allows Stored XSS by setting a crafted Knowledge Base label and adding any available item.
CVSS Score
5.4
EPSS Score
0.002
Published
2019-10-05
TeamPass 2.1.27.36 allows Stored XSS by placing a payload in the username field during a login attempt. When an administrator looks at the log of failed logins, the XSS payload will be executed.
CVSS Score
6.1
EPSS Score
0.004
Published
2019-10-05
TeamPass 2.1.27.36 allows Stored XSS at the Search page by setting a crafted password for an item in any folder.
CVSS Score
5.4
EPSS Score
0.002
Published
2019-10-05
TeamPass 2.1.27.36 allows Stored XSS by setting a crafted password for an item in a common available folder or sharing the item with an admin. (The crafted password is exploitable when viewing the change history of the item or tapping on the item.)
CVSS Score
5.4
EPSS Score
0.002
Published
2019-09-26


Contact Us

Shodan ® - All rights reserved