BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • KeePass does not accept user complaints about vulnerabilities in their systems


    The developers of KeePass, after numerous complaints from users, refused to acknowledge the existing vulnerability, which allows a hacker to quietly export the entire database in clear text.

    Bug CVE-2023-24055 (CVSS: 5.5) allows a cybercriminal with write access to the target system to modify the KeePass configuration XML file and inject a malicious trigger that exports the database, including all usernames and passwords in clear text.

    The next time the target launches KeePass and enters the master password, the export rule will be triggered and the contents of the database will be stored in a file that the hacker can later exfiltrate onto their server. What's more, the export process runs in the background without notifying the user or prompting KeePass for a master password as confirmation before exporting, allowing an attacker to stealthily gain access to all stored passwords.

    Although the Dutch and Belgian CERTs have issued a security advisory regarding this bug, the KeePass development team maintains that this flaw is not a vulnerability given that an attacker can also access the KeePass database in other ways. It's worth noting that the "Write Access to Configuration File" issue has been around in the KeePass Help Center since April 2019 and is not considered a KeePass security vulnerability.

    If a user has installed KeePass as a regular program and attackers have write access, they can also "perform various kinds of attacks", such as replacing the KeePass executable with malware.

    The developers of KeePass have explained that an attacker can perform much more powerful attacks than changing the configuration file (and these attacks can also affect KeePass, regardless of the protection of the configuration file).

    According to them, these attacks can only be prevented by maintaining a secure environment (antivirus software, firewall, not opening unknown email attachments, etc.). "KeePass cannot magically work securely in an insecure environment."

    If the developers don't provide a fix for the problem, users can secure their database themselves by logging in as an administrator and creating a forced configuration file that takes precedence over settings, including malicious triggers. It is important to note that the configuration file must be located in the same directory as the KeePass executable - otherwise, a hacker will be able to bypass this protection.

    Author DeepWeb
    Why does marijuana make you want to eat?
    New Sh1mmer exploit unlinks ChromeBook from organization

    Comments 0

    Add comment