A vulnerability recently addressed in LastPass could be abused by attackers to expose the last site credentials filled by LastPass.
A freemium password manager, LastPass stores encrypted passwords online and provides users with a web interface to access them, as well as with plugins for web browsers and apps for smartphones.
The newly patched vulnerability impacted the extensions for the Chrome and Opera browsers, and could be exploited in a limited set of circumstances only, LastPass says. The attacker could exploit the flaw to create a clickjacking scenario.
The exploitation process would require for the user to fill a password using the LastPass icon, and then visit a compromised or malicious website. The attacker would also have to trick the user into clicking on the page several times.
“This exploit may result in the last site credentials filled by LastPass to be exposed,” LastPass explains.
Google Project Zero security researcher Tavis Ormandy was the one to discover the vulnerability and report it to LastPass. The researcher says the flaw should be considered High severity, although it won’t work for all URLs.
LastPass pushed a patch on September 12, in the form of version 4.33.0 / v4.33.4. All browser extensions are being updated automatically and no user interaction is required.
“We quickly worked to develop a fix and verified the solution was comprehensive with Tavis,” LastPass notes.
LastPass also recommends a series of best practices, such as to avoid clicking on links from unknown sources, to enable multi-factor authentication for LastPass and other services (bank, email, Twitter, Facebook, etc.), to avoid reusing or disclosing the LastPass master password, to use unique passwords for every account, and to use an antivirus program.
Related: Overall Security of Password Managers Debatable, Cracking Firm Says

More from Ionut Arghire
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
Latest News
- US Downs Chinese Balloon Off Carolina Coast
- Microsoft: Iran Unit Behind Charlie Hebdo Hack-and-Leak Op
- Feds Say Cyberattack Caused Suicide Helpline’s Outage
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
