CVE-2024-33669
JavaScript vulnerability analysis and mitigation

Overview

CVE-2024-33669 affects Passbolt Browser Extension versions before 4.6.2. The vulnerability involves an information leak where the extension sends multiple requests to HaveIBeenPwned while a password is being typed (NVD, Quarkslab Blog).

Technical details

The vulnerability occurs when the Passbolt Browser Extension sends queries to the HaveIBeenPwned API as soon as a user types a password, with a 300ms delay between keystrokes. For passwords longer than 7 characters, each keystroke triggers an API query containing the first 5 nibbles (20 bits) of the SHA1 hash of the current password. This implementation allows an attacker observing the HTTPS queries to potentially brute force the password being typed (Quarkslab Blog).

Impact

An attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API can more easily brute force passwords that are manually typed by the user. The vulnerability becomes particularly effective for passwords of 11 characters or longer, where multiple sequential API queries can be used to progressively determine each character (NVD, Quarkslab Blog).

Mitigation and workarounds

The vulnerability has been fixed in Passbolt Browser Extension version 4.6.2. The fix involves only querying the Pwned Passwords API when saving a new or updated password, and only if the password's estimated entropy is larger than 60 bits (Passbolt Incident, Quarkslab Blog).

Community reactions

Following the disclosure, Troy Hunt updated the Pwned Passwords APIv3 documentation to include a warning about the risks of incremental searches. The vulnerability was responsibly disclosed to Passbolt, who responded promptly and collaborated actively to ensure a smooth resolution (Quarkslab Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management