An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API to more easily brute force passwords that are manually typed by the user.
References
| Link | Resource |
|---|---|
| https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html | Third Party Advisory Exploit |
| https://haveibeenpwned.com | Product |
| https://help.passbolt.com/incidents/pwned-password-service-information-leak | Issue Tracking Vendor Advisory |
| https://www.passbolt.com | Product |
| https://www.passbolt.com/security/more | Product |
| https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html | Third Party Advisory Exploit |
| https://haveibeenpwned.com | Product |
| https://help.passbolt.com/incidents/pwned-password-service-information-leak | Issue Tracking Vendor Advisory |
| https://www.passbolt.com | Product |
| https://www.passbolt.com/security/more | Product |
Configurations
History
No history.
Information
Published : 2024-04-26 01:15
Updated : 2025-06-18 19:26
NVD link : CVE-2024-33669
Mitre link : CVE-2024-33669
CVE.ORG link : CVE-2024-33669
JSON object : View
Products Affected
passbolt
- passbolt_browser_extension
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
