Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Also vulnerable when using master password + key file? #10

Closed
wouterVE opened this issue May 22, 2023 · 1 comment
Closed

Also vulnerable when using master password + key file? #10

wouterVE opened this issue May 22, 2023 · 1 comment

Comments

@wouterVE
Copy link

I cannot find an answer for this on this page nor on this sourgeforge thread discussing this vulnerability so:

Is this vulnerability also exploitable when using a key file together with your master passord?

I've tried this PoC on 2 databases I use, both having a key file. It returned some random letters and numbers, nothing related with my password. The databases are created using an older version of Keepass tough (don't know which, but must be several years ago).

Afterwards, I created a new password (using 2.53.1) using only a master password and I was able to decrypt it using this PoC.

Thanks for clarification

@vdohney
Copy link
Owner

vdohney commented May 23, 2023

The key file is unrelated to this. If you have it stored somewhere else than your computer, like a flash drive, then you are probably ok. I haven't done any analysis though. In general, if the attacker only has your password but not the key file, they shouldn't be able to decrypt your DB.

For issue relating the old DB (separate) please post here: #4 - especially if you would happen to remember the particular version you created the DB with. Unfortunately, I am still unable to reproduce it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants