Vulnerability CVE-2023-30367


Published: 2023-07-26

Description:
mRemoteNG configuration files can be stored in an encrypted state on disk. mRemoteNG version <= v1.76.20 and <= 1.77.3-dev loads configuration files in plain text into memory at application start-up, even if no connection has been established yet. This allows attackers to access contents of configuration files in plain text through a memory dump and thus compromise user credentials when no custom password encryption key has been set. This also bypasses the connection configuration file encryption setting by dumping already decrypted configurations from memory.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
mRemoteNG 1.77.3.1784-NB Sensitive Information Extraction
Maximilian Barz
31.07.2023

 References:
https://github.com/mRemoteNG/mRemoteNG/issues/2420
https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper
https://www.secuvera.de/advisories/secuvera-SA-2023-01.txt

Copyright 2024, cxsecurity.com

 

Back to Top