# N/A
## 概述
在KeePass 2.x版本中,存在一个安全漏洞,攻击者可以通过内存转储恢复明文主密码,即使数据库被锁定或不再运行。
## 影响版本
KeePass 2.x 版本低于 2.54
## 细节
该漏洞可以通过以下几种内存转储方式访问明文主密码:
- KeePass 进程转储
- 交换文件(pagefile.sys)
- 系统休眠文件(hiberfil.sys)
- 整个系统的RAM转储
需要特别注意的是,被恢复的明文主密码的第一个字符无法被恢复。
## 影响
在 2.54 版本中,KeePass 使用了不同的 API 或者插入随机字符串来缓解这种风险。因此,低于2.54版本的用户需要尽快升级以减少安全风险。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Original PoC for CVE-2023-32784 | https://github.com/vdohney/keepass-password-dumper | POC详情 |
2 | KeePass Master Password Extraction PoC for Linux | https://github.com/CTM1/CVE-2023-32784-keepass-linux | POC详情 |
3 | This script complements the results obtained through the keepass-password-dumper tool when exploiting the CVE-2023-32784 vulnerability affecting KeePass. | https://github.com/und3sc0n0c1d0/BruteForce-to-KeePass | POC详情 |
4 | KeePass 2.X dumper (CVE-2023-32784) | https://github.com/z-jxy/keepass_dump | POC详情 |
5 | A CVE-2023-32784 proof-of-concept implementation in Rust | https://github.com/LeDocteurDesBits/cve-2023-32784 | POC详情 |
6 | Re-write of original KeePass 2.X Master Password Dumper (CVE-2023-32784) POC in python. | https://github.com/hau-zy/KeePass-dump-py | POC详情 |
7 | Retrieve the master password of a keepass database <= 2.53.1 | https://github.com/dawnl3ss/CVE-2023-32784 | POC详情 |
8 | None | https://github.com/ValentinPundikov/poc-CVE-2023-32784 | POC详情 |
9 | None | https://github.com/mister-turtle/cve-2023-32784 | POC详情 |
10 | year 2 semester 1 Systems and Network Programming Assignment | https://github.com/Cmadhushanka/CVE-2023-32784-Exploitation | POC详情 |
11 | None | https://github.com/le01s/poc-CVE-2023-32784 | POC详情 |
12 | A Python console program that exploits the security vulnerability CVE-2023-32784 in the password manager KeePass. This exploit reconstructs the master password in plain text based on memory dumps (.DMP). | https://github.com/SarahZimmermann-Schmutzler/exploit_keepass | POC详情 |
13 | None | https://github.com/dev0558/CVE-2023-32784-EXPLOIT-REPORT | POC详情 |
14 | After using the KeePass password dumper maybe some character parsed as ● is incorrect and you want to know the real character | https://github.com/G4sp4rCS/CVE-2023-32784-password-combinator-fixer | POC详情 |