{"id":4827,"date":"2023-05-17T23:47:31","date_gmt":"2023-05-17T21:47:31","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=4827"},"modified":"2023-05-17T23:49:52","modified_gmt":"2023-05-17T21:49:52","slug":"keepass-ranjivost-omogucava-preuzimanje-glavne-lozinke-cve-2023-32784","status":"publish","type":"post","link":"http:\/\/sajberinfo.com\/en\/2023\/05\/17\/keepass-ranjivost-omogucava-preuzimanje-glavne-lozinke-cve-2023-32784\/","title":{"rendered":"KeePass ranjivost omogu\u0107ava preuzimanje glavne lozinke (CVE-2023-32784)"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Sigurnosni istra\u017eiva\u010d je otkrio ranjivost u menad\u017eeru lozinki otvorenog k\u00f4da <em>KeePass<\/em> koja mo\u017ee omogu\u0107iti preuzimanje glavne lozinke za otklju\u010davanje baze sa lozinkama.<\/span><\/p>\n<div id=\"attachment_4828\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4828\" class=\"size-full wp-image-4828\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/KeePass-flaw.jpg\" alt=\"KeePass ranjivost \" width=\"1024\" height=\"663\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/KeePass-flaw.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/KeePass-flaw-300x194.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/KeePass-flaw-768x497.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/KeePass-flaw-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-4828\" class=\"wp-caption-text\"><em>KeePass ranjivost omogu\u0107ava preuzimanje glavne lozinke (CVE-2023-32784); Dizajn: Sa\u0161a \u0110uri\u0107<\/em><\/p><\/div>\n<h2><span style=\"font-size: 14pt;\"><strong>Ranjivost<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">Sigurnosni istra\u017eiva\u010d pod nazivom \u201c<em>vdohney<\/em>\u201d je otkrio ranjivost u <em>KeePass<\/em> menad\u017eeru lozinki koja je ozna\u010dena kao <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-32784\" target=\"_blank\" rel=\"noopener\"><em>CVE-2023-32784<\/em><\/a>. Ova ranjivost omogu\u0107ava u verzijama starijim od <em>2.54<\/em> preuzimanje glavnu <a href=\"https:\/\/sajberinfo.com\/en\/2019\/02\/24\/lozinka-password-sifra\/\" target=\"_blank\" rel=\"nofollow noopener\">lozinku<\/a> u tekstualnom obliku iz memorije, \u010dak i kada je aplikacija zaklju\u010dana ili\u00a0 vi\u0161e ne radi. Ispis sadr\u017eaja memorije mo\u017ee biti <em>KeePass<\/em> ispis procesa, datoteka za razmjenu podataka (<em>pagefile.sys<\/em>), datoteka hibernacije (<em>hiberfil.sys<\/em>) ili ispis \u010ditavog sistema u <em>RAM<\/em> memoriji. Prvi znak glavne lozinke ne mo\u017ee biti povra\u0107en.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Problem uti\u010de na <em>SecureTextBoxEx<\/em>, prilago\u0111eni tekstualni okvir softvera za unos glavne lozinke i drugih lozinki tokom ure\u0111ivanja. Gre\u0161ka koja se ovdje iskori\u0161tava je u tome \u0161to se za svaki ukucani karakter stvara preostali niz u memoriji. Zbog na\u010dina na koji .<em>NET<\/em> funkcioni\u0161e, skoro ga se nemoguc\u0301e otarasiti kada se stvori. Ako se za primjer otkuca rije\u010d \u201c<em>Lozinka<\/em>\u201d, to \u0107e prikazati sljede\u0107e preostale nizove: <em>\u2022o, \u2022\u2022z, \u2022\u2022\u2022i, \u2022\u2022\u2022\u2022n, \u2022\u2022\u2022\u2022\u2022k, \u2022\u2022\u2022\u2022\u2022\u2022a<\/em>.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Na pouzdanost ovog napada mo\u017ee uticati kako je lozinka otkucana i koliko je lozinki otkucano po sesiji. \u010cak i ako postoji vi\u0161e lozinki po sesiji ili gre\u0161aka u kucanju, na\u010din na koji <em>.NET CLR<\/em> dodjeljuje ove stringove zna\u010di da \u0107e oni vjerovatno biti lijepo poredani u memoriji. Dakle, ako su otkucane tri razli\u010dite lozinke, vjerovatno \u0107e biti tri kandidata za svaku poziciju karaktera u tom redosljedu, \u0161to omogu\u0107ava vra\u0107anje sve tri lozinke.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-size: 14pt;\"><strong>Problem<\/strong><\/span><\/h3>\n<p><span style=\"font-size: 14pt;\">Lo\u0161a vijest za korisnike je da ranjivost jo\u0161 nije ispravljena, a ve\u0107 postoji alatka za iskori\u0161tavanje nazvana <em>KeePass 2.X Master Password Dumper<\/em> koja je javno dostupna. Dobra vijest za korisnike da se lozinka ne mo\u017ee preuzeti na daljinu samo iskori\u0161tavanjem ranjivosti.<\/span><\/p>\n<p>&nbsp;<\/p>\n<blockquote><p><span style=\"font-size: 14pt;\"><em>\u201cAko je va\u0161 ra\u010dunar ve\u0107 zara\u017een <a href=\"https:\/\/sajberinfo.com\/en\/2021\/09\/26\/malware\/\" target=\"_blank\" rel=\"nofollow noopener\">zlonamjernim softverom<\/a> koji radi u pozadini sa privilegijama va\u0161eg korisnika, ovo otkri\u0107e ne pogor\u0161ava va\u0161u situaciju mnogo. Ako imate osnovanu sumnju da bi neko mogao da dobije pristup va\u0161em ra\u010dunaru i sprovede forenzi\u010dku analizu, ovo bi moglo biti lo\u0161e. Najgori scenario je da \u0107e glavna lozinka biti vra\u0107ena, uprkos tome \u0161to je KeePass zaklju\u010dan ili uop\u0161te ne radi.\u201d<\/em><\/span><\/p>\n<p style=\"text-align: right;\"><span style=\"font-size: 14pt;\"><em>\u00a0<\/em><\/span><span style=\"font-size: 14pt;\"><em>&#8211; <\/em><a href=\"https:\/\/github.com\/vdohney\/keepass-password-dumper\" target=\"_blank\" rel=\"noopener\"><em>Sigurnosni istra\u017eiva\u010d vdohney<\/em><\/a><em> &#8211;<\/em><\/span><\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-size: 14pt;\"><strong>Rje\u0161enje<\/strong><\/span><\/h4>\n<p><span style=\"font-size: 14pt;\">Ranjivost poga\u0111a <em>KeePass 2.X<\/em> za <em>Windows<\/em> i vjerovatno za <em>Linux<\/em> i <em>macOS<\/em>. Ispravka je dostupna u testnoj verziji <em>KeePass 2.54<\/em> koja bi trebala biti nakon zavr\u0161enog testiranja zvani\u010dno dostupna za preuzimanje u julu 2023. godine.<\/span><\/p>\n<p>&nbsp;<\/p>\n<blockquote><p><span style=\"font-size: 14pt;\"><em>\u201cPobolj\u0161anja \u0107e biti uklju\u010dena u sljede\u0107e KeePass izdanje (2.54). Trenutno jo\u0161 uvijek radim na nekoliko drugih funkcija (tako\u0111e povezanih sa bezbjedno\u0161\u0107u) i \u010dim se one zavr\u0161e, objavi\u0107u ih. Nema fiksnog datuma, ali sam siguran da \u0107e to biti u naredna dva mjeseca.\u201d<\/em><\/span><\/p>\n<p style=\"text-align: right;\"><span style=\"font-size: 14pt;\"><em>\u00a0<\/em><\/span><span style=\"font-size: 14pt;\"><em>&#8211; <\/em><a href=\"https:\/\/sourceforge.net\/p\/keepass\/discussion\/329220\/thread\/f3438e6283\/#0829\" target=\"_blank\" rel=\"noopener\"><em>KeePass autor <\/em><em>Dominik Reichl<\/em><\/a><em> &#8211;<\/em><\/span><\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\">Na\u017ealost, dokaz izvodljivosti (eng. <em>proof of concept \u2013 PoC<\/em>) je dostupan javno, a nova verzija softvera sa ispravkom ne\u0107e sti\u0107i tako brzo. Jedino \u0161to je pozitivno je to \u0161to se ranjivost <em>CVE-2023-32784<\/em> ne mo\u017ee ba\u0161 tako lako iskoristiti.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\"><em>KeepassXC,<\/em> nezavisna KeePass verzija koja radi na vi\u0161e operativnih sistema, nije pogo\u0111en ovom ranjivo\u0161\u0107u.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Sigurnosni istra\u017eiva\u010d je otkrio ranjivost u menad\u017eeru lozinki otvorenog k\u00f4da KeePass koja mo\u017ee omogu\u0107iti preuzimanje glavne lozinke za otklju\u010davanje baze sa lozinkama. Ranjivost Sigurnosni istra\u017eiva\u010d pod nazivom \u201cvdohney\u201d je otkrio ranjivost u KeePass menad\u017eeru&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":4828,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[267,141,144,126,143],"class_list":["post-4827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-keepass","tag-linux","tag-macos","tag-vulnerability","tag-windows"],"_links":{"self":[{"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=4827"}],"version-history":[{"count":0,"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4827\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/4828"}],"wp:attachment":[{"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=4827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=4827"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=4827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}