Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-3084: 3.0.9 · nilsteampassnet/TeamPass@61b9b7d

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE
#xss#git#java

Expand Up

@@ -1679,13 +1679,30 @@ function(data) {

userDidAChange = false;

userUploadedFile = false;

// Sanitize text fields

let formLabel = fieldSanitizeStep1('#form-folder-add-label’, false, false, false),

formIcon = fieldSanitizeStep1('#form-folder-add-icon’, false, false, false),

formIconSelected = fieldSanitizeStep1('#form-folder-add-icon-selected’, false, false, false);

if (formLabel === false || formIcon === false || formIconSelected === false) {

// Label is empty

toastr.remove();

toastr.warning(

'XSS attempt detected. Field has been emptied.’,

'Error’, {

timeOut: 5000,

progressBar: true

}

);

return false;

}

var data = {

'title’: DOMPurify.sanitize($(‘#form-folder-add-label’).val(), {USE_PROFILES: {html: false}}),

'title’: formLabel,

'parentId’: $(‘#form-folder-add-parent option:selected’).val(),

'complexity’: $(‘#form-folder-add-complexicity option:selected’).val(),

//’access_rights_strategy’: $(‘#form-folder-add-rights option:selected’).val(),

'icon’: DOMPurify.sanitize($(‘#form-folder-add-icon’).val(), {USE_PROFILES: {html: false}}),

'iconSelected’: DOMPurify.sanitize($(‘#form-folder-add-icon-selected’).val(), {USE_PROFILES: {html: false}}),

'icon’: formIcon,

'iconSelected’: formIconSelected,

'id’: selectedFolderId,

}

if (debugJavascript === true) console.log(data);

Expand Down

Related news

GHSA-8vm8-38pc-8xhh: TeamPass vulnerable to stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907