Password Manager Injection Attacks
Yesterday I was listening to Steve Gibson's Security Now podcast, and one of the day's topics was password managers and specifically what was described as injection attacks. You can read the content here starting on page 13:
https://www.grc.com/sn/SN-992-Notes.pdf
Password managers are a semi-regular topic on Gibson's podcast, and he in fact went into great detail on the LastPass breach. 1Password is a sponsor of his podcast as is BitWarden. As the notes describe, researcher brought attention to two papers that dug into password manager vulnerability via injection attacks. They looked at 10 password managers, 1Password being one of them.
There were three vulnerabilities described:
- "The first class of attacks, which the researchers refer to as “Vault-Health Logging” rely upon the newer features of application-wide metrics. "
- "The second class of attacks is “URL icon fetching."
- "The third and final class of attacks only affects KeePassXC (among the top ten password
managers tested). This arises from KeePassXC’s storage file system. "
Regarding attack 1, my concern is on 1Password's Watchtower. For attack 2, based on the podcast, I have disabled website icons in my settings. And attack 3 is not an issue, or is it? 1Password has a local vault that enables offline use.
Gibson indicated all the password managers were contacted with the research findings prior to publication, so I assume this is known to 1Password. And with that I'd like 1Password to comment.
Folks digging into the details like this is nothing but a good thing as uncovering weaknesses benefits us all.
1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Browser: Not Provided
Comments
-
Thanks for the inquiry here @JAC3467
The referenced podcast mentions a particular paper that covered a broad class of attacks across multiple password managers that are generally beyond the scope of this forum.
With that said, the researchers in question followed responsible disclosure by going through our bug bounty process with BugCrowd as part of publishing in USENIX Security '24. Details of their findings can be found here: https://bugcrowd.com/disclosures/9d0dd9c9-a27d-44b1-b62a-3ff218d7931c/efficient-credential-spoofing-attack-on-the-personal-credentials-stored-in-a-user-s-vault
For more details on our security posture and the protections we put in place for vaults, we recommend taking a look at our whitepaper.
0