top | item 35075861

Bitwarden flaw can let hackers steal passwords using iframes

35 points| ghostpepper | 3 years ago |bleepingcomputer.com

10 comments

order
[+] suprjami|3 years ago|reply
How do you think Bitwarden could have handled this better?

An allowlist of domains where iframe autofill is allowed, pre-populated with some vetted examples like apple/icloud mentioned in the article?

At what point do user options trump accessibility? I tell my parents to use Bitwarden because it's more secure than their alternative (plaintext in Google Doc) but they have no idea what an iframe is or how to spot one. If I taught them they'd never remember because it something so seldom used. Password managers are written for an audience much larger than us. Such an option as suggested would be useless to them.

Maybe Bitwarden made the right choice here?

[+] MisterKent|3 years ago|reply
Minor fail by bitwarden...

- odds of arbitrary malicious iframe being on login page seems vanishingly small, especially when a compromise of the login page is probably necessary before the iframe can be injected. How often can an iframe be injected but not arbitrary js?

- iframes having autofill should definitely be a sub option on such a feature.

Either way, also curious about other password managers and their behaviors here. TFA doesn't go into that, seems like a big omission.

[+] ghostpepper|3 years ago|reply
> odds of arbitrary malicious iframe being on login page seems vanishingly small

It's pretty common to inject credit card skimmers into checkout pages - why would login pages be any different?

[+] pieter_mj|3 years ago|reply
I suppose any password manager that allows browser extensions to handle these pages automatically, exhibits the same flaw.
[+] sha-3|3 years ago|reply
Is anyone familiar with how the KeePassXC browser extension handles this?
[+] pieter_mj|3 years ago|reply
The same way, you can set the extension to automatically fill in and confirm, so it has the same flaw. It is not the default setting afaik.
[+] derkades|3 years ago|reply
It's disabled by default, and it's made clear that enabling it is a security risk