CVE-2024-50701

4.3 MEDIUM

📋 TL;DR

TeamPass versions before 3.1.3.1 contain an authorization bypass vulnerability where users can access folder information without proper permission checks. This affects all TeamPass instances running vulnerable versions, potentially allowing unauthorized users to view sensitive folder metadata and access rights.

💻 Affected Systems

Products:
  • TeamPass
Versions: All versions before 3.1.3.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All TeamPass installations with folder-based access control are affected. The vulnerability is in the core authorization logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could enumerate folder structures, access rights, and potentially gain visibility into sensitive password management hierarchies, leading to information disclosure and privilege escalation opportunities.

🟠

Likely Case

Users with limited permissions could access information about folders they shouldn't see, potentially learning about organizational structure or sensitive project folders they're not authorized to access.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to information disclosure within the TeamPass application scope.

🌐 Internet-Facing: MEDIUM - Internet-facing instances could allow external attackers to enumerate folder structures if they gain user-level access.
🏢 Internal Only: MEDIUM - Internal users could bypass intended access controls and view unauthorized folder information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated user access but minimal technical skill to exploit. The vulnerability is in the folder permission checking logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.3.1

Vendor Advisory: https://github.com/nilsteampassnet/TeamPass/commit/ddbb2d3d94085dced50c4936fd2215af88e4a88d

Restart Required: No

Instructions:

1. Backup your TeamPass installation and database. 2. Download TeamPass 3.1.3.1 from the official repository. 3. Replace all files with the new version. 4. Run the update script if provided. 5. Verify folder access controls are working correctly.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Limit user access to only essential folders and implement additional logging for folder access attempts.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TeamPass from untrusted networks
  • Enable detailed logging for all folder access attempts and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check TeamPass version in the application interface or by examining the source code version files. Versions before 3.1.3.1 are vulnerable.

Check Version:

Check the version displayed in TeamPass admin interface or examine includes/config.php for version information.

Verify Fix Applied:

After updating to 3.1.3.1, test folder access controls with test users having limited permissions to ensure they cannot access unauthorized folder information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual folder access patterns
  • Users accessing folders outside their permission scope
  • Multiple failed permission checks followed by successful access

Network Indicators:

  • Unusual API calls to folder information endpoints from unauthorized users

SIEM Query:

source="teampass" AND (event="folder_access" OR event="permission_check") AND result="success" AND user_permissions NOT CONTAINS accessed_folder

🔗 References

📤 Share & Export