An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API to more easily brute force passwords that are manually typed by the user.
References
Configurations
No configuration.
History
21 Nov 2024, 09:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html - | |
References | () https://haveibeenpwned.com - | |
References | () https://help.passbolt.com/incidents/pwned-password-service-information-leak - | |
References | () https://www.passbolt.com - | |
References | () https://www.passbolt.com/security/more - |
03 Jul 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-200 | |
Summary |
|
26 Apr 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-26 01:15
Updated : 2024-11-21 09:17
NVD link : CVE-2024-33669
Mitre link : CVE-2024-33669
CVE.ORG link : CVE-2024-33669
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor