This top password manager apparently has a major security flaw that could spill all your logins By Mobile Malls May 19, 2023 0 206 views Widespread password supervisor KeePass has a worrying exploit that would presumably end in your grasp password being stolen.A safety researcher has revealed a proof-of-concept that demonstrates how a risk actor may extract a person’s grasp password from the KeePass app’s reminiscence by exploiting a bug, tracked as CVE-2023-3278 .“KeePass Grasp Password Dumper is an easy proof-of-concept instrument used to dump the grasp password from KeePass’s reminiscence. Aside from the primary password character, it’s largely capable of get well the password in plaintext,” claims the researcher.No code executionThey added that, “No code execution on the goal system is required, only a reminiscence dump. It does not matter the place the reminiscence comes from – could be the course of dump, swap file (pagefile.sys), hibernation file (hiberfil.sys) or RAM dump of the whole system. It does not matter whether or not or not the workspace is locked.”The grasp password will also be extracted from the system’s RAM after KeePass has stopped working, though the researcher famous that the extra time has elapsed because the app’s closure, the possibilities of profitable extraction lower.The PoC was examined on Home windows, however the researcher claims that the exploit additionally works on macOS and Linux variations. The PoC works by exploiting a custom-developed textual content field for password entry, SecureTextBoxEx, which commits the characters a person sorts to the system reminiscence. This field will not be solely used when typing the grasp password, but in addition when modifying different saved passwords as properly, so these is also compromised.The flaw impacts KeePass 2.53.1 and any forks (the app is open-source) based mostly on the unique KeePass 2.X app written in .NET. The researcher states that KeePassXC, Strongbox, and KeePass 1.X will not be affected, amongst potential different variations. KeePass developer Dominik Reichl confirmed the existence of the vulnerability. A repair needs to be coming this June with model 2.54. The danger of an assault taking place within the wild is considerably restricted, although. The researcher says that in case your system is already contaminated with malware, then this exploit may make it simpler for them to go undetected when attempting to steal your grasp password, since no code execution is required. Nonetheless, in case your system is clear, then you ought to be fantastic, as “nobody can steal your passwords remotely over the web with this discovering alone,” states the researcher.See if KeePass makes it into our greatest open supply software program informationShare this:Click to share on Twitter (Opens in new window)Click to share on Facebook (Opens in new window)MoreClick to print (Opens in new window)Click to email a link to a friend (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Tumblr (Opens in new window)Click to share on Pinterest (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)