An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API to more easily brute force passwords that are manually typed by the user.
References
Link | Resource |
---|---|
https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html | Third Party Advisory Exploit |
https://haveibeenpwned.com | Product |
https://help.passbolt.com/incidents/pwned-password-service-information-leak | Issue Tracking Vendor Advisory |
https://www.passbolt.com | Product |
https://www.passbolt.com/security/more | Product |
https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html | Third Party Advisory Exploit |
https://haveibeenpwned.com | Product |
https://help.passbolt.com/incidents/pwned-password-service-information-leak | Issue Tracking Vendor Advisory |
https://www.passbolt.com | Product |
https://www.passbolt.com/security/more | Product |
Configurations
History
18 Jun 2025, 19:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html - Third Party Advisory, Exploit | |
References | () https://haveibeenpwned.com - Product | |
References | () https://help.passbolt.com/incidents/pwned-password-service-information-leak - Issue Tracking, Vendor Advisory | |
References | () https://www.passbolt.com - Product | |
References | () https://www.passbolt.com/security/more - Product | |
CPE | cpe:2.3:a:passbolt:passbolt_browser_extension:*:*:*:*:*:*:*:* | |
First Time |
Passbolt
Passbolt passbolt Browser Extension |
21 Nov 2024, 09:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html - | |
References | () https://haveibeenpwned.com - | |
References | () https://help.passbolt.com/incidents/pwned-password-service-information-leak - | |
References | () https://www.passbolt.com - | |
References | () https://www.passbolt.com/security/more - |
03 Jul 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CWE | CWE-200 |
26 Apr 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-26 01:15
Updated : 2025-06-18 19:26
NVD link : CVE-2024-33669
Mitre link : CVE-2024-33669
CVE.ORG link : CVE-2024-33669
JSON object : View
Products Affected
passbolt
- passbolt_browser_extension
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor