ALT-PU-2025-2135-3
Closed vulnerabilities
BDU:2023-03124
Уязвимость текстового поля для ввода пароля менеджера паролей KeePass, связанная с хранением учетных данных в незашифрованном виде, позволяющая нарушителю восстановить мастер-пароль в открытом виде
BDU:2023-07674
Уязвимость менеджера паролей KeePass, связанная с незашифрованным хранением критичной информации, позволяющая нарушителю получить пароли в открытом виде
Modified: 2024-11-21
CVE-2023-24055
KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
- https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/
- https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/
- https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/
- https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/
- https://sourceforge.net/p/keepass/feature-requests/2773/
- https://sourceforge.net/p/keepass/feature-requests/2773/
Modified: 2025-01-23
CVE-2023-32784
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
- https://github.com/keepassxreboot/keepassxc/discussions/9433
- https://github.com/keepassxreboot/keepassxc/discussions/9433
- https://github.com/vdohney/keepass-password-dumper
- https://github.com/vdohney/keepass-password-dumper
- https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/
- https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/