After the Heartbleed vulnerability shook most of the Internet earlier this year, many users turned to password management services in order to reset their account credentials with affected sites. However, it seems that even these security-oriented services may not be safe to use. In a new paper, a group of researchers at UC Berkeley examined five common Web-based password managers, and they found vulnerabilities in each that could have led to compromised user data.
The services in question—LastPass, RoboForm, NeedMyPassword, My1Login, and PasswordBox—all fell to at least one of a variety of attacks, including vulnerabilities in bookmarklets, cross-site scripting, cross-site request forgery, phishing, and unauthorized access to shared logons. Each of the services was about as vulnerable as any other, so there's no real winner to be named here.
The researchers disclosed their findings to the services they studied, and most of the companies affected patched the vulnerabilities before the study was made public. NeedMyPassword never responded to the researchers' vulnerability disclosure, however, even as the paper went to publication (the study took place about a year ago.) If you're a user of that service, you may want to find a new password manager.
The researchers warn that their manual analysis of these vulnerabilities was far from exhaustive, so other critical bugs might still lurk in these services. Applications that run outside the browser, like 1Password, Password Safe, and KeePass may be more secure solutions, but even the most trustworthy software isn't 100% free of bugs. If you do choose to use a cloud-based service, be aware that the convenience of the cloud may also bring security risks.