KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/ | third party advisory patch |
https://sourceforge.net/p/keepass/feature-requests/2773/ | third party advisory |
https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/ | third party advisory |