Data center: Ashburn, VA

Telegram Chat : MBHH_x86

Email Us:

Mobile Hacker For Hire, hire a hacker, hiring a hacker, hacker with proof

Popular password managers auto-filled credentials on untrusted websites

Table of Contents

John Leyden

20 January 2023 at 12:09 UTC

Updated: 20 January 2023 at 12:12 UTC

Dashlane, Bitwarden, and Safari all cited by Google researchers

Google has gone public about disputed vulnerabilities in at least three password management utilities

Security shortcomings mean that multiple password managers could be tricked into auto-filling credentials on untrusted pages, security researchers at Google warn.

The team from Google went public with their findings on Tuesday (17 January), 90 days after notifying the applications – Dashlane, Bitwarden, and the built-in password manager bundled with Apple’s Safari browser – of the vulnerabilities.

Both Dashlane and Bitwarden have updated their software although Dashlane, at least, remains unconvinced that the bug represents any kind of security threat. The status of any fix for Apple’s Safari built-in password manager remains unconfirmed at the time of writing. The Daily Swig has asked Apple to comment and we’ll update this story as and when more information comes to hand.

Catch up with the latest cybersecurity research news

The security shortcomings outlined by Google mean that the vulnerable password managers auto-fill credentials into untrusted pages, without first requiring users to enter their master password.

An advisory from Google explains that the issue arises in two scenarios: where web pages have a CSP (content security policy) sandbox response header or where forms are inside a sandboxed iframe.

Auto-filling by password managers should not happen in either scenario but the affected applications all fail in this regard when encountering sandboxed content. Other password managers (including LastPass, 1Password, and Google Chrome’s password vault technology) avoid this mistake, said Google.

“Password managers should check whether content is sandboxed before auto-filling credentials. This can be done in many ways, but one way is to check self.origin of a page and refusing to fill in credentials if self.origin is ‘null’,” according to the Google advisory.

Real world impact

In response to a query from The Daily Swig, Bitwarden confirmed that the issue had been resolved through a recent pull request. Dashlane told The Daily Swig that it had also updated its technology even though it remains unconvinced there was a substantive problem in play.

“We’ve changed the behavior following the report (so the advisory is misleading),” Dashlane said. “We also don’t believe that it was a real issue to start with (the author doesn’t detail any real attack scenario nor answer our questions).”

Google is yet to respond to a request from The Daily Swig to respond to Dashlane’s criticisms of its research findings.

YOU MAY ALSO LIKE Google pays hacker duo $22k in bug bounties for flaws in multiple cloud projects

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!