CVE-2024-33669

An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API to more easily brute force passwords that are manually typed by the user.
Configurations

No configuration.

History

21 Nov 2024, 09:17

Type Values Removed Values Added
References () https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html - () https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html -
References () https://haveibeenpwned.com - () https://haveibeenpwned.com -
References () https://help.passbolt.com/incidents/pwned-password-service-information-leak - () https://help.passbolt.com/incidents/pwned-password-service-information-leak -
References () https://www.passbolt.com - () https://www.passbolt.com -
References () https://www.passbolt.com/security/more - () https://www.passbolt.com/security/more -

03 Jul 2024, 01:58

Type Values Removed Values Added
CWE CWE-200
Summary
  • (es) Se descubrió un problema en Passbolt Browser Extension antes de 4.6.2. Puede enviar múltiples solicitudes a HaveIBeenPwned mientras se escribe una contraseña, lo que resulta en una fuga de información. Esto permite a un atacante capaz de observar las consultas HTTPS de Passbolt a la API de Pwned Password forzar más fácilmente las contraseñas que el usuario escribe manualmente.

26 Apr 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-26 01:15

Updated : 2024-11-21 09:17


NVD link : CVE-2024-33669

Mitre link : CVE-2024-33669

CVE.ORG link : CVE-2024-33669


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor