Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixing a vulnerability where a standard user could disable any user #4367

Merged
merged 1 commit into from
Sep 26, 2024

Conversation

nilsteampassnet
Copy link
Owner

Fixing a vulnerability where a standard user could disable any user

By querying the endpoint /sources/users.queries.php , all it takes is to specify the identi昀椀er of the user to be disabled, as well as a parameter ( disabled_status ) to de昀椀ne whether the target user should be disabled or enabled.
The JSON will take the following form:
{
"user_id": 10000021,
"disabled_status": 1
}
Here, the user_id 昀椀eld corresponds to the identi昀椀er of the target account. If the disabled_status 昀椀eld is set to 1 , the account will be disabled, and if it is set to 0 , the account will be enabled.
Using the developed script, the following command can be executed:
python3 teampass_poc.py request --uri "/sources/users.queries.php" --data '{"user_id":
,"disabled_status": 1}' --key "" --type "manage_user_disable_status"

Fix for #4366
Small code cleaning

Fixing a vulnerability where a standard user could disable any user
Fix for #4366
Small code cleaning
@nilsteampassnet nilsteampassnet merged commit 619895f into master Sep 26, 2024
2 of 3 checks passed
@nilsteampassnet nilsteampassnet deleted the vulnerability-disabling-user branch September 26, 2024 04:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants