HTML Injection in Folder Name in nilsteampassnet/teampass
Valid
Reported on
Jun 6th 2023
Description
The folder name does not sanitize folder name and due to missing output encoding, HTML user-input is rendered in the webpage during folder deletion.
Proof of Concept
- Login to Teampass as any user.
- Go to Folders tab.
- Create a new folder with HTML tag in the Label. Example:
<h1>HTML Injection<h1>
- Select the created folder and click on
Delete
. - The HTML code from the
Label
is rendered in the webpage.
Impact
An user with authorization to create folders can add HTML code to the Label
and add items to the page during folder deletion by other users. This could be used to deceive and phish unsuspecting users.
References
We are processing your report and will contact the
nilsteampassnet/teampass
team within 24 hours.
4 months ago
We have contacted a member of the
nilsteampassnet/teampass
team and are waiting to hear back
3 months ago
The researcher's credibility has increased: +7
The fix bounty has been dropped
This vulnerability has been assigned a CVE
Thank you
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
to join this conversation