CVE-2021-21323
Summary
| CVE | CVE-2021-21323 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-02-23 23:15:00 UTC |
| Updated | 2021-03-01 16:14:00 UTC |
| Description | Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS provider. (DNS requests that were not initiated by CNAME adblocking would go through Tor as expected.) This is fixed in Brave version 1.20.108 |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fix Tor dns leak by darkdh · Pull Request #7769 · brave/brave-core · GitHub | MISC | github.com | Patch, Third Party Advisory |
| Regression in DNS leakage from Tor windows · Advisory · brave/brave-browser · GitHub | CONFIRM | github.com | Third Party Advisory |
| HackerOne | MISC | hackerone.com | Permissions Required, Third Party Advisory |
| [hackerone] Tor DNS issue · Issue #13527 · brave/brave-browser · GitHub | MISC | github.com | Patch, Third Party Advisory |
| Merge pull request #7769 from brave/tor-dns-leak · brave/brave-core@12fe321 · GitHub | MISC | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.