this post was submitted on 28 Jul 2024
1 points (100.0% liked)

Bitwarden

766 readers
3 users here now

Discuss the Paswordmanager Bitwarden.

founded 1 year ago
MODERATORS
 

I understand that if you have Bitwarden (or any password manager or browser) configured to autofill your password when it encounters a "password" field on a web form, an easy exploit is for the web form to have hidden form fields (e.g., address, phone, email, ssn) and your autofill app will fill in your info into those fields, even though you only wanted it to autofill the login.

But when you have autofill turned off and you click in a form's "login" field and select a login from Bitwrden's contextual menu, Bitwarden automatically also fills in the "Password" field. Does this mean that the exploit exists even if autofill is turned off, as long as you're using any form of an "auto-fill" function?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 3 months ago

I don't think this vulnerability applies to bitwarden the same way it does to e.g. chrome browser.

Bitwarden only offers to fill form fields when you have a password for this website - this means, that this website already has your data. Also, bitwarden does not have your address, ssn, phone stored.

Chrome on the other hand allows you to store a multitude of form fields and can filll them automatically, and thus could leak personal data.