CVE-2024-50701
📋 TL;DR
TeamPass versions before 3.1.3.1 contain an authorization bypass vulnerability where users can access folder information without proper permission checks. This affects all TeamPass instances running vulnerable versions, potentially allowing unauthorized users to view sensitive folder metadata and access rights.
💻 Affected Systems
- TeamPass
📦 What is this software?
Teampass by Teampass
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized users could enumerate folder structures, access rights, and potentially gain visibility into sensitive password management hierarchies, leading to information disclosure and privilege escalation opportunities.
Likely Case
Users with limited permissions could access information about folders they shouldn't see, potentially learning about organizational structure or sensitive project folders they're not authorized to access.
If Mitigated
With proper network segmentation and access controls, the impact is limited to information disclosure within the TeamPass application scope.
🎯 Exploit Status
Requires authenticated user access but minimal technical skill to exploit. The vulnerability is in the folder permission checking logic.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.1.3.1
Vendor Advisory: https://github.com/nilsteampassnet/TeamPass/commit/ddbb2d3d94085dced50c4936fd2215af88e4a88d
Restart Required: No
Instructions:
1. Backup your TeamPass installation and database. 2. Download TeamPass 3.1.3.1 from the official repository. 3. Replace all files with the new version. 4. Run the update script if provided. 5. Verify folder access controls are working correctly.
🔧 Temporary Workarounds
Temporary Access Restriction
allLimit user access to only essential folders and implement additional logging for folder access attempts.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate TeamPass from untrusted networks
- Enable detailed logging for all folder access attempts and monitor for suspicious patterns
🔍 How to Verify
Check if Vulnerable:
Check TeamPass version in the application interface or by examining the source code version files. Versions before 3.1.3.1 are vulnerable.
Check Version:
Check the version displayed in TeamPass admin interface or examine includes/config.php for version information.
Verify Fix Applied:
After updating to 3.1.3.1, test folder access controls with test users having limited permissions to ensure they cannot access unauthorized folder information.
📡 Detection & Monitoring
Log Indicators:
- Unusual folder access patterns
- Users accessing folders outside their permission scope
- Multiple failed permission checks followed by successful access
Network Indicators:
- Unusual API calls to folder information endpoints from unauthorized users
SIEM Query:
source="teampass" AND (event="folder_access" OR event="permission_check") AND result="success" AND user_permissions NOT CONTAINS accessed_folder