CVE-2023-24055

KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
Configurations

Configuration 1 (hide)

cpe:2.3:a:keepass:keepass:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:47

Type Values Removed Values Added
References () https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/ - Third Party Advisory () https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/ - Third Party Advisory
References () https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/ - Patch, Third Party Advisory () https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/ - Patch, Third Party Advisory
References () https://sourceforge.net/p/keepass/feature-requests/2773/ - Third Party Advisory () https://sourceforge.net/p/keepass/feature-requests/2773/ - Third Party Advisory

21 Mar 2024, 02:46

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-22 04:15

Updated : 2024-11-21 07:47


NVD link : CVE-2023-24055

Mitre link : CVE-2023-24055

CVE.ORG link : CVE-2023-24055


JSON object : View

Products Affected

keepass

  • keepass
CWE
CWE-312

Cleartext Storage of Sensitive Information