CVE-2022-30334
Summary
| CVE | CVE-2022-30334 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-05-07 05:15:00 UTC |
| Updated | 2023-08-08 14:22:00 UTC |
| Description | Brave before 1.34, when a Private Window with Tor Connectivity is used, leaks .onion URLs in Referer and Origin headers. NOTE: although this was fixed by Brave, the Brave documentation still advises "Note that Private Windows with Tor Connectivity in Brave are just regular private windows that use Tor as a proxy. Brave does NOT implement most of the privacy protections from Tor Browser." |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Strip referrer and origin headers in xorigin requests from a .onion by fmarier · Pull Request #10760 · brave/brave-core · GitHub | MISC | github.com | |
| HackerOne | MISC | hackerone.com | |
| [hackerone] Strip referrer and origin in cross-origin requests from a `.onion` origin · Issue #18071 · brave/brave-browser · GitHub | MISC | github.com | |
| What is a Private Window with Tor Connectivity? – Brave Help Center | MISC | support.brave.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.