CVE-2024-33669
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API to more easily brute force passwords that are manually typed by the user.
Se descubrió un problema en Passbolt Browser Extension antes de 4.6.2. Puede enviar múltiples solicitudes a HaveIBeenPwned mientras se escribe una contraseña, lo que resulta en una fuga de información. Esto permite a un atacante capaz de observar las consultas HTTPS de Passbolt a la API de Pwned Password forzar más fácilmente las contraseñas que el usuario escribe manualmente.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-04-26 CVE Reserved
- 2024-04-26 CVE Published
- 2024-04-26 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (5)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Passbolt Search vendor "Passbolt" | Passbolt Api Search vendor "Passbolt" for product "Passbolt Api" | * | - |
Affected
|