Multiple vulnerabilities in Team Password Manager



Published: 2021-11-26
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-44036
CVE-2021-44037
CWE-ID CWE-352
CWE-640
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Team Password Manager
Client/Desktop applications / Other client software

Vendor

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Cross-site request forgery

EUVDB-ID: #VU58390

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-44036

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin during import. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Team Password Manager: before 10.135.236

External links

http://teampasswordmanager.com/docs/changelog/#10.135.236
http://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-059.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Weak Password Recovery Mechanism for Forgotten Password

EUVDB-ID: #VU58391

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-44037

CWE-ID: CWE-640 - Weak password recovery mechanism

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to password-reset poisoning issue. A remote attacker can reset an user's password.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Team Password Manager: before 10.135.236

External links

http://teampasswordmanager.com/docs/changelog/#10.135.236
http://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-060.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###