ID: CVE-2023-24055

Last Modified: Jan. 31, 2023

** DISPUTED ** KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.

Twitter Activity

Tweets last week: 483

Remaining steady

Yahoo Activity

Yahoo results: 0

Remaining steady

EPSS History

Current EPSS Score: 0.01404

Remaining steady


Reddit Activity

Reddit Posts: 9

Remaining steady

Github Repos

Github Repos: 5

Remaining steady

Exploits

Found exploits:

Attack Vector: Local

Attack Complexity: Low

Privileges Required: None

User Interaction: Required

Scope: Unchanged

Confidentiality: High

Integrity: None

Availability: None

Base Score: 5.5

Exploitability Score: 1.8

Impact Score: 3.6

CVSS V3: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Specialize CVSS-Score

CWE-312

Condition Configuration
OR
OR
Alle Schwachstellen für keepass
Date: Jan. 31, 2023

CWE-ID: Not defined
Base Score V3: Not defined
Exploitability Score V3: Not defined
Impact Score V3: Not defined
Cvss Vector V3: Not defined
Configuration:
added:
cpe:2.3:a:keepass:keepass:*:*:*:*:*:*:*:*



Date: Jan. 31, 2023

Cvss Vector V3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N



Date: Feb. 2, 2023

Reference:
added:
https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:keepass:keepass:*:*:*:*:*:*:*:*"/>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:keepass:keepass:*:*:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
</set>