The open-source password manager KeePass was recently updated to fix a vulnerability that allowed attackers to obtain the master password in clear text from a memory dump. The vulnerability, known as CVE-2023-32784, affects versions of KeePass 2.x. It is caused by a custom-developed textbox used for password input, which leaves behind a string in memory for each character typed by the user.
To exploit this vulnerability, an attacker can recover the strings and rebuild the typed password. Since the strings are stored in a specific order in memory, even multiple passwords can be recovered.