CVE-2021-44036

8.8 HIGH

📋 TL;DR

Team Password Manager versions before 10.135.236 have a Cross-Site Request Forgery (CSRF) vulnerability during import operations. This allows attackers to trick authenticated users into performing unauthorized import actions without their knowledge. Organizations using vulnerable versions of Team Password Manager are affected.

💻 Affected Systems

Products:
  • Team Password Manager (TeamPasswordManager)
Versions: All versions before 10.135.236
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the import functionality and affects all default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trick an administrator into importing malicious password data, potentially compromising all stored credentials and gaining unauthorized access to sensitive systems.

🟠

Likely Case

Attackers could manipulate password imports to add backdoors, modify existing credentials, or exfiltrate sensitive password data from the system.

🟢

If Mitigated

With proper CSRF protections and user awareness training, the risk is significantly reduced as users would need to be tricked into performing specific actions while authenticated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are relatively simple to execute but require the victim to be authenticated and tricked into visiting a malicious page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.135.236 and later

Vendor Advisory: https://teampasswordmanager.com/docs/changelog/#10.135.236

Restart Required: Yes

Instructions:

1. Backup your Team Password Manager installation and database. 2. Download version 10.135.236 or later from the official website. 3. Follow the upgrade instructions in the documentation. 4. Restart the application services.

🔧 Temporary Workarounds

CSRF Token Implementation

all

Implement custom CSRF tokens for import operations if unable to patch immediately

Import Restriction

all

Temporarily disable import functionality or restrict it to specific trusted IP addresses

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies and Content Security Policy headers
  • Educate users about CSRF risks and require manual confirmation for all import operations

🔍 How to Verify

Check if Vulnerable:

Check the Team Password Manager version in the admin interface or configuration files. If version is below 10.135.236, the system is vulnerable.

Check Version:

Check the application version in the web interface under Admin > System Information or examine the application configuration files.

Verify Fix Applied:

After upgrading, verify the version shows 10.135.236 or higher in the admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual import operations from unexpected IP addresses
  • Multiple failed import attempts
  • Import operations without corresponding user interface interactions

Network Indicators:

  • HTTP POST requests to import endpoints without proper referrer headers
  • Requests with missing or invalid CSRF tokens

SIEM Query:

source="team_password_manager" AND (event_type="import" AND (referrer NOT CONTAINS "teampasswordmanager.com" OR csrf_token=""))

🔗 References

📤 Share & Export