Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS provider. (DNS requests that were not initiated by CNAME adblocking would go through Tor as expected.) This is fixed in Brave version 1.20.108
References
Link | Resource |
---|---|
https://github.com/brave/brave-browser/issues/13527 | Patch Third Party Advisory |
https://github.com/brave/brave-browser/security/advisories/GHSA-mqjf-9x5g-2rv6 | Third Party Advisory |
https://github.com/brave/brave-core/commit/12fe321eaad8acc1cbd1d70b4128f687777bcf15 | Patch Third Party Advisory |
https://github.com/brave/brave-core/pull/7769 | Patch Third Party Advisory |
https://hackerone.com/reports/1077022 | Permissions Required Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-02-23 23:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-21323
Mitre link : CVE-2021-21323
CVE.ORG link : CVE-2021-21323
JSON object : View
Products Affected
brave
- brave
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor