KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
References
Link | Resource |
---|---|
https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/ | Third Party Advisory |
https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/ | Patch Third Party Advisory |
https://sourceforge.net/p/keepass/feature-requests/2773/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-01-22T00:00:00
Updated: 2024-06-10T17:00:40.269Z
Reserved: 2023-01-21T00:00:00
Link: CVE-2023-24055
JSON object: View
NVD Information
Status : Modified
Published: 2023-01-22T04:15:11.560
Modified: 2024-06-10T17:16:11.240
Link: CVE-2023-24055
JSON object: View
Redhat Information
No data.
CWE