** DISPUTED ** KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
Attack Vector (AV) | Network | Adjacent | Local | Physical |
---|---|---|---|---|
Attack Complexity (AC) | LOW | High | ||
Privileges Required (PR) | None | Low | High | |
User Interaction (UI) | None | Required | ||
Scope (S) | Unchange | Change | ||
Confidentiality (C) | None | Low | High | |
Integrity (I) | None | Low | High | |
Availability (A) | None | Low | High |
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Linux(1 tweets) Windows(3 tweets) iOS(1 tweets)
List of frequently cited URLs
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
cvetrends.com | 52 |
github.com | 22 |
news.ycombinator.com | 6 |
xcloud.spectrum.colortokens.com | 6 |
noticiasseguridad.com | 4 |
www.bleepingcomputer.com | 4 |
sco.lt | 3 |
buff.ly | 3 |
twitter.com | 3 |
www.it-connect.fr | 3 |
securite.developpez.com | 3 |
Name | URL |
---|---|
alt3kx/CVE-2023-24055_PoC | https://github.com/alt3kx/CVE-2023-24055_PoC |
deetl/CVE-2023-24055 | https://github.com/deetl/CVE-2023-24055 |
Live-Hack-CVE/CVE-2023-24055 | https://github.com/Live-Hack-CVE/CVE-2023-24055 |
julesbozouklian/PoC_CVE-2023-24055 | https://github.com/julesbozouklian/PoC_CVE-2023-24055 |
Cyb3rtus/keepass_CVE-2023-24055_yara_rule | https://github.com/Cyb3rtus/keepass_CVE-2023-24055_yara_rule |
Name | URL |
---|---|
alt3kx/CVE-2023-24055_PoC | github.com |
deetl/CVE-2023-24055 | github.com |
Live-Hack-CVE/CVE-2023-24055 | github.com |
julesbozouklian/PoC_CVE-2023-24055 | github.com |
Cyb3rtus/keepass_CVE-2023-24055_yara_rule | github.com |