You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Teampass includes a feature to restrict the source IP address users can use to interact with Teampass. The value of the source IP address is defined from the first value in the X-Forwarded-For header in the client request.
Due to the fact that the client controls the X-Forwarded-For header and can set it to any value of their choosing, this header can be set to a whitelisted value which allows any client that can guess a whitelisted IP address to interact with Teampass from wherever they like.
Steps to reproduce
Add 1.1.1.1 to the list of API IP Addresses allowed
Make an API call with an appropriate X-Forwarded-For header and notice that the call is valid
The feature of which you speak was introduced in #1559 - the assumption here is that the application is deployed behind a sanitising proxy which does not permit the user to control the XFF header.
Perhaps the solution here is to allow the administrator to choose if XFF is honoured in the installation or not.
Teampass includes a feature to restrict the source IP address users can use to interact with Teampass. The value of the source IP address is defined from the first value in the X-Forwarded-For header in the client request.
Due to the fact that the client controls the X-Forwarded-For header and can set it to any value of their choosing, this header can be set to a whitelisted value which allows any client that can guess a whitelisted IP address to interact with Teampass from wherever they like.
Steps to reproduce
curl -v -H "X-Forwarded-For: 1.1.1.1" http://localhost/teampass/api/index.php/info/version/?apikey=xyz
Steps to fix
Server configuration
Teampass version:
2.1.27.36
The text was updated successfully, but these errors were encountered: