Stored XSS on FolderName Affecting other users and admin. in nilsteampassnet/teampass
Reported on
May 26th 2023
Description
If two users have same folder permission, malicious users can rename the folder with XSS payload, which will affect the other user, and admin.
Payload: "><img src=x onerror=alert(1)>
Proof of Concept
https://drive.google.com/file/d/1ukzcFocVAnd8WKEEo7-zE4iEMVLKUnXt/view
Impact
Malicious users could potentially exploit the vulnerability in the label field of an item to carry out an HTML injection attack, which could redirect other users to an attacker's website or capture their sensitive data through a form. This could result in a variety of negative consequences, including the theft of confidential information, financial loss, and reputational damage to the affected users or organizations. Additionally, the attack could spread further, affecting other users who interact with the compromised item or website, leading to a wider breach of security.
References
@srivallikusumba Don't publish on Github. YOu already published here and saw the mail. Multiplying message will not make me fix faster ... it may have the opposite effect Thank you
sorry for the inconvenience...will not publish on GitHub...just wanted to get some update regarding the bug .