### [CVE-2017-16541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16541) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected. ### POC #### Reference - https://bugzilla.mozilla.org/show_bug.cgi?id=1412081 - https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541