Metamask Demonic Vulnerability
Abstract
MetaMask before 10.11.3 might allow an attacker to access a user's secret recovery phrase because an input field
is used for a BIP39 mnemonic, and Firefox and Chromium save such fields to disk without encryption in order to support the Restore Session feature, aka the Demonic issue.
Status | Fixed |
Type | User Client |
Date | Jun 10, 2022 |
Source | |
Project Repo |
Details
Restore Session
Chrome(and some other browsers) can restore sessions(pages, windows, etc.) closed unintentionally by calling
The sessions
object contains some information, including unencrypted plain text from text input field, which is stored at /Users/"$USER"/Library/Application Support/Google/Chrome/Default/Sessions
.
Fix
Split the secret recovery phrase input field into one field per word. Each word uses a type="password"
field, which cannot be stored by the restore sessions feature.
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32969
Last updated