cve/2017/CVE-2017-16541.md

20 lines
942 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-16541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16541)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
- https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541