Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-1545 PoC — SQL Injection in nilsteampassnet/teampass

Source
Associated Vulnerability
Title: SQL Injection in nilsteampassnet/teampass (CVE-2023-1545)
Description:SQL Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.
Description
Python Proof of Concept for CVE-2023-1545 (SQL Injection for Teampass versions prior to 3.0.0.23).
Readme
# CVE-2023-1545

Simple SQL Injection `Python` script for `Teampass` prior to versions `3.0.0.23`, leveraging [CVE-2023-1545](https://nvd.nist.gov/vuln/detail/CVE-2023-1545). More information on [this blog](https://security.snyk.io/vuln/SNYK-PHP-NILSTEAMPASSNETTEAMPASS-3367612).

## Usage
Just use set the URL where `Teampass` is running as unique argument:
```shell
python3 CVE-2023-1545.py http://example.com:8080
```


## Discliamer

Use it for ethical purposes only (:
File Snapshot

[4.0K] /data/pocs/935257c20c6d4c13c94277191c47d84841fb8c0a ├── [4.8K] CVE-2023-1545.py └── [ 474] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →