Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2023-41646 #336

Closed
perry-mitchell opened this issue Sep 15, 2023 · 1 comment · Fixed by #338
Closed

CVE-2023-41646 #336

perry-mitchell opened this issue Sep 15, 2023 · 1 comment · Fixed by #338

Comments

@perry-mitchell
Copy link
Member

Example: https://github.com/buttercup/buttercup-core/blob/master/source/core/VaultSource.ts#L267

Credentials, by design, currently stores the master password, when encrypted.

This should be refactored so that it is no longer stored anywhere, at rest.

Source repo: https://github.com/tristao-marinho/CVE-2023-41646

@perry-mitchell
Copy link
Member Author

The attached PR prevents Buttercup from writing the master password to any stringified credentials, which is what was written to ~/local/share/Buttercup-nodejs/vaults.json in the original CVE description. The credentials are never plain text, but once updated after this is released it will no longer be included in the payload.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant