cve/2023/CVE-2023-24055.md
2024-06-18 02:51:15 +02:00

37 lines
1.7 KiB
Markdown

### [CVE-2023-24055](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24055)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
** DISPUTED ** KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
### POC
#### Reference
- https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ATTACKnDEFEND/CVE-2023-24055
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Cyb3rtus/keepass_CVE-2023-24055_yara_rule
- https://github.com/GhostTroops/TOP
- https://github.com/Orange-Cyberdefense/KeePwn
- https://github.com/deetl/CVE-2023-24055
- https://github.com/digital-dev/KeePass-TriggerLess
- https://github.com/duckbillsecurity/CVE-2023-24055
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/jonasw234/attackerkb_checker
- https://github.com/julesbozouklian/PoC_CVE-2023-24055
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/n3rada/Invoke-KeePassBackup
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
- https://github.com/zwlsix/KeePass-CVE-2023-24055