Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2516 PoC — Cross-site Scripting (XSS) - Stored in nilsteampassnet/teampass

Source
Associated Vulnerability
Title:Cross-site Scripting (XSS) - Stored in nilsteampassnet/teampass (CVE-2023-2516)
Description:Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7.
Description
Medium Blog
Readme
# CVE-2023-2516: Stored XSS Vulnerability in Teampass 3.0.6 - M Nadeem Qazi

Hey everyone, I wanted to share with you a vulnerability that I discovered in Teampass, a password management software. I found a stored XSS vulnerability (CVE-2023-2516) that allows attackers to inject malicious code into shared folders, which can potentially lead to serious consequences such as theft of sensitive data or unauthorized access to systems.

## Vulnerability Details

- Vulnerability Type: Stored XSS
- CVE: CVE-2023-2516
- Software Version: Teampass 3.0.6
- Author: M Nadeem Qazi

### Description

If two users have permission to access a shared folder, an attacker can create a new item in the folder and insert an XSS payload into the item's field. When the item is saved, the payload is successfully implemented within the shared folder. Then, when another user opens the shared folder and clicks on the item, an XSS alert is activated.

### Proof of Concept (PoC)

[![PoC](https://img.youtube.com/vi/qctjMvaFUuA/0.jpg)](https://youtu.be/qctjMvaFUuA)

## Mitigation

I reported this vulnerability to the Teampass development team and it has been fixed in the latest version of the software. However, users should still take precautions to prevent exploitation, such as limiting access to shared folders and being cautious when opening links or files from untrusted sources.

## Additional Resources

If you're interested in learning more about my findings, check out the report link on [huntr.dev](https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716/).

You can also follow me for updates on my research and other security-related topics:

- Instagram: [@mnqazi](https://www.instagram.com/mnqazi)
- Twitter: [@mnqazi](https://twitter.com/mnqazi)
- Facebook: [@mnqazi](https://www.facebook.com/mnqazi)
- LinkedIn: [M_Nadeem_Qazi](https://www.linkedin.com/in/m-nadeem-qazi)

Stay safe out there!
File Snapshot

[4.0K] /data/pocs/eb8f29bd142abf99f6e18cd6ab287d04ab9e7e55 └── [1.9K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →