fkie_cve-2017-9436
Vulnerability from fkie_nvd
Published
2017-06-05 14:29
Modified
2024-11-21 03:36
Severity ?
Summary
TeamPass before 2.1.27.4 is vulnerable to a SQL injection in users.queries.php.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/nilsteampassnet/TeamPass/blob/master/changelog.md | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/nilsteampassnet/TeamPass/blob/master/changelog.md | Issue Tracking, Patch, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teampass:teampass:2.1.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6E39DA4-DF60-4DB1-B647-AFE8EC9E7DB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B3FE1B6-B126-45F2-8741-901E97C79894", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "8896298A-354B-4AEF-BA87-945A2F09A977", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "C276CD9C-09A4-4D97-B371-33DE4F0558F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "3DC7A6CB-ED06-4AE9-9A56-5146F5906253", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "94E05F72-3EDC-4DF7-B2E9-D22E512346E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "96FD295D-C318-4484-A097-1F6EBE417491", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D3EE7AE-D4E5-42BB-A1FB-6790789CEC53", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "51E6BC0C-670F-499D-B639-D7766A9DE80C", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.24.3:*:*:*:*:*:*:*", "matchCriteriaId": "FE663CEF-6D83-440A-A103-3596FFBF9677", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.24.4:*:*:*:*:*:*:*", "matchCriteriaId": "C082E19A-88A6-4A6F-8436-41DC217106A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FECEF3A-84DD-430D-9DD8-4ECAD0BCBA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.25.1:*:*:*:*:*:*:*", "matchCriteriaId": "86A131C1-42F7-4286-9AE1-C6EEC6FAF55C", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.25.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BC5E891-17C1-4E95-9E00-2110FA2CBBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28AE082A-1C30-44C9-A7FD-F1F53C208B3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "897F9ED9-E288-43A7-8D26-F29131DE49FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CB8FBFB-CB8F-4672-B3D9-D5402ADB8D72", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.2:*:*:*:*:*:*:*", "matchCriteriaId": "B776505D-7C89-42CF-9E24-A768462B2576", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.3:*:*:*:*:*:*:*", "matchCriteriaId": "1CED2812-E7AD-4B27-8794-76DDE1AA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.4:*:*:*:*:*:*:*", "matchCriteriaId": "647F45F5-27FC-445B-8560-3BABD223FE81", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.5:*:*:*:*:*:*:*", "matchCriteriaId": "3DE0C84A-345A-4B9A-A50C-46814970C0C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.6:*:*:*:*:*:*:*", "matchCriteriaId": "21EDF657-C59F-4DB3-B0F1-516854FBBECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.7:*:*:*:*:*:*:*", "matchCriteriaId": "654A9BA2-5DF1-4BA3-AFE5-ADF610F60C62", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.8:*:*:*:*:*:*:*", "matchCriteriaId": "F19D551F-A27A-4646-B4A5-958AC366F5DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.9:*:*:*:*:*:*:*", "matchCriteriaId": "7E2370D3-F123-462E-94C6-196CD11D3D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.10:*:*:*:*:*:*:*", "matchCriteriaId": "3A45C638-FB9C-442A-8617-A15EA8517304", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD262F8E-5209-47CB-AD08-033FD346084E", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.12:*:*:*:*:*:*:*", "matchCriteriaId": "7A49988E-DCBF-4CA7-A9BD-FAAB15F6C694", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.13:*:*:*:*:*:*:*", "matchCriteriaId": "D5270230-1A7E-4602-845A-1A31AF4758AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.14:*:*:*:*:*:*:*", "matchCriteriaId": "D9800AF7-E93B-4051-AB84-C70E67C8366B", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.15:*:*:*:*:*:*:*", "matchCriteriaId": "905A3A93-5429-4617-87EE-E2F89BDB9F3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.16:*:*:*:*:*:*:*", "matchCriteriaId": "E4613D1E-15FF-4F08-8E14-7F0982A037CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.17:*:*:*:*:*:*:*", "matchCriteriaId": "B042637C-4E8D-4A77-8ADB-6A02CEDD8210", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.18:*:*:*:*:*:*:*", "matchCriteriaId": "C228A11C-7C26-4DC0-9B5F-F7044FB3D98D", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.26.19:*:*:*:*:*:*:*", "matchCriteriaId": "2C3C3ECC-A39E-427C-A8A6-C468B4E3DE09", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "0B2B1AFA-390F-4DE1-84B9-71C707704FA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FDDA6D8-8517-4A64-888E-F2BEF5D3A8DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.27.2:*:*:*:*:*:*:*", "matchCriteriaId": "C82FB18A-BFB6-4C36-B311-C86AD904637D", "vulnerable": true }, { "criteria": "cpe:2.3:a:teampass:teampass:2.1.27.3:*:*:*:*:*:*:*", "matchCriteriaId": "E08B58C4-356C-4793-B9DA-D8AF041EFDE4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TeamPass before 2.1.27.4 is vulnerable to a SQL injection in users.queries.php." }, { "lang": "es", "value": "TeamPass anterior a versi\u00f3n 2.1.27.4, es vulnerable a una inyecci\u00f3n SQL en el archivo users.queries.php." } ], "id": "CVE-2017-9436", "lastModified": "2024-11-21T03:36:07.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-05T14:29:00.700", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nilsteampassnet/TeamPass/blob/master/changelog.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nilsteampassnet/TeamPass/blob/master/changelog.md" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.