Vulnerability Description
TeamPass before 2.1.20 allows remote attackers to bypass access restrictions via the language file path in a (1) request to index.php or (2) "change_user_language" request to sources/main.queries.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Teampass | Teampass | <= 2.1.20 |
Related Weaknesses (CWE)
References
- http://teampass.net/installation/2.1.20-released.htmlVendor Advisory
- http://www.openwall.com/lists/oss-security/2014/05/18/2
- http://www.openwall.com/lists/oss-security/2014/05/19/5
- https://github.com/nilsteampassnet/TeamPass/commit/fd549b245c0f639a8d47bf4f74f92ExploitPatch
- http://teampass.net/installation/2.1.20-released.htmlVendor Advisory
- http://www.openwall.com/lists/oss-security/2014/05/18/2
- http://www.openwall.com/lists/oss-security/2014/05/19/5
- https://github.com/nilsteampassnet/TeamPass/commit/fd549b245c0f639a8d47bf4f74f92ExploitPatch
FAQ
What is CVE-2014-3771?
CVE-2014-3771 is a vulnerability with a CVSS score of 7.5 (HIGH). TeamPass before 2.1.20 allows remote attackers to bypass access restrictions via the language file path in a (1) request to index.php or (2) "change_user_language" request to sources/main.queries.php.
How severe is CVE-2014-3771?
CVE-2014-3771 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3771?
Check the references section above for vendor advisories and patch information. Affected products include: Teampass Teampass.