Bitwarden also doesn’t warn users when they’re filling out a form hosted on a different page or site, and gives a free pass to subdomains of a website, too. ![]() This vulnerability exists whether you have Bitwarden preemptively fill out login forms or you manually trigger autofill Flashpoint’s testing showed that either usage of autofill carries the same risk. ICloud’s login page uses iframes to enable login through -and Bitwarden cites this as one reason for its lax policy on autofill. The company gives the example of iCloud as a major website that still uses iframes to connect to for login. This permissiveness isn’t by accident, but design: In the company’s documentation about the issue, which was published in late 2018, Bitwarden states that its goal is to encourage better adaption to a password manager. ![]() If any of those external HTML elements become compromised (like advertising, a known vector for exploits), the result could be stolen login data. On websites that use iframes-where a page loads HTML elements from a different webpage-login forms hosted on an external website are still filled in with the saved site’s user ID and password info. ![]() However, until that update goes live, our original report and advice stand.īut as security firm Flashpoint.io detailed in a blog post last week, Bitwarden’s autofill has a deeper vulnerability than other services. Updated on 3/17/23: Bitwarden says it will be releasing changes next week to its autofill behavior, which we’ve outlined at the end of this article along with revised recommendations for steps you can take to keep your passwords safe online.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |