CVE-2024-50703

5.4 MEDIUM

📋 TL;DR

CVE-2024-50703 is an authorization bypass vulnerability in TeamPass password management software where a user can act with the privileges of a different user_id. This allows unauthorized access to other users' password vaults and sensitive data. All TeamPass installations before version 3.1.3.1 are affected.

💻 Affected Systems

Products:
  • TeamPass
Versions: All versions before 3.1.3.1
Operating Systems: Any OS running TeamPass
Default Config Vulnerable: ⚠️ Yes
Notes: All TeamPass deployments with default configuration are vulnerable. The vulnerability exists in the core authorization logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative privileges and accesses all stored passwords, potentially leading to complete system compromise and credential theft across the organization.

🟠

Likely Case

A regular user accesses other users' password vaults, exposing sensitive credentials and potentially enabling lateral movement within the network.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the TeamPass instance itself, though stored credentials remain at risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once authenticated. The vulnerability is in authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.3.1

Vendor Advisory: https://github.com/nilsteampassnet/TeamPass/commit/c7f7f809071eaa9e04505ee79cec7049a42959e9

Restart Required: No

Instructions:

1. Backup your TeamPass installation and database. 2. Download TeamPass 3.1.3.1 from the official repository. 3. Replace all files with the new version. 4. Verify the installation works correctly.

🔧 Temporary Workarounds

Restrict Access

all

Limit TeamPass access to trusted users only and implement strict network controls.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all TeamPass user activity for suspicious behavior.
  • Consider migrating critical passwords to a different password management solution until patching is possible.

🔍 How to Verify

Check if Vulnerable:

Check the TeamPass version in the application interface or by examining the source code version markers.

Check Version:

Check the TeamPass web interface or examine includes/config.php for version information.

Verify Fix Applied:

Verify the version is 3.1.3.1 or later and test authorization controls between different user accounts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user activity patterns, multiple user_id references in single sessions, access to password items not owned by the user

Network Indicators:

  • Multiple authentication requests from same IP with different user credentials

SIEM Query:

source="teampass" AND (event="unauthorized_access" OR user_id_mismatch)

🔗 References

📤 Share & Export