Title: ====== KeyPass Password Safe v1.22 - Software Filter Vulnerability Date: ===== 2012-06-26 References: =========== http://www.vulnerability-lab.com/get_content.php?id=615 VL-ID: ===== 615 Common Vulnerability Scoring System: ==================================== 3 Introduction: ============= KeePass is a very famous & free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). (Copy of the Vendor Homepage: http://keepass.info ) Abstract: ========= The Vulnerability Laboratory Research Team discovered a software filter & validation vulnerability in the KeyPass Password Manager v1.22 & older versions. Report-Timeline: ================ 2012-06-13: Researcher Notification & Coordination 2012-06-14: Vendor Notification 2012-06-20: Vendor Response/Feedback 2012-06-26: Public or Non-Public Disclosure 2012-07-01: Vendor Fix/Patch Status: ======== Published Affected Products: ================== Domenic Reichl Product: Keypass Password Safe v1.22 & older versions Exploitation-Technique: ======================= Remote Severity: ========= Medium Details: ======== A software filter & validation vulnerability is detected in the KeyPass Password Manager v1.22 & older versions. The bug allows an attacker (local) to implement/inject malicious script code when processing to export a manipulated KeyPass Password Manager database. The vulnerability is located in the validation of the html/xml export function/module & the bound vulnerable domain/url (listing) parameter. URLs of entries are embedded in the exported HTML file without encoding XML special characters, when the URL (domain) field of an entry contains a malicious script code, this will be executed when the exported HTML file is opened in a browser. Exploitation of the vulnerabilitiy requires a manipulated url with malicious script code, a logging server with chmod 777, a listing file (random) & an keypass v1.22 user. The bug will be injected on the local way, affects the local validation (html/xml) and change the technic back when remote transfering the password lists. The injection of the malicious url/domain context can be done via import (victim) or manually (reproduce)by including. Successful exploitation of the vulnerability lead to stable (persistent) context manipulation, persistent phishing, execution of malware or stealing plain password lists. Medium user inter action is required to exploit the vulnerability. Normally KeyPass Password Manager exports the html backup with a secure clean template like ...