CVE-2023-24055
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
KeePass en la versión 2.53 (en una instalación por defecto) permite a un atacante, que tiene acceso de escritura al archivo de configuración XML, obtener las contraseñas en texto claro mediante la adición de un disparador de exportación. NOTA: la posición del vendedor es que la base de datos de contraseñas no está pensada para ser segura contra un atacante que tenga ese nivel de acceso al PC local.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-01-21 CVE Reserved
- 2023-01-22 CVE Published
- 2023-01-25 First Exploit
- 2024-08-02 CVE Updated
- 2024-08-14 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-312: Cleartext Storage of Sensitive Information
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw | Third Party Advisory | |
https://sourceforge.net/p/keepass/feature-requests/2773 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/deetl/CVE-2023-24055 | 2023-01-25 | |
https://github.com/duckbillsecurity/CVE-2023-24055 | 2023-02-04 | |
https://github.com/zwlsix/KeePass-CVE-2023-24055 | 2023-02-14 |
URL | Date | SRC |
---|---|---|
https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b | 2024-06-10 |
URL | Date | SRC |
---|