Prevent WebRTC leak.
Bug broker Zerodium has released word of a flaw in the Tor browser that would potentially allow an attack site to bypass security protections and execute malicious code in the supposedly secure internet system.
The flaw was disclosed in a Zerodium Tweet Monday morning that provides some detail on the nature of the flaw.
Advisory: Tor Browser 7.x has a serious vuln/bugdoor leading to full bypass of Tor / NoScript ‘Safest’ security level (supposed to block all JS).
PoC: Set the Content-Type of your html/js page to “text/html;/json” and enjoy full JS pwnage. Newly released Tor 8.x is Not affected.
— Zerodium (@Zerodium) September 10, 2018
Also posted was a proof of concept script showing the exploit in action.
Very easy to reproduce the Zerodium Tor Browser 7.x NoScript bypass vulnerability https://t.co/k78ejoavWl #TorBrowser #vulnerability pic.twitter.com/k1mUJZUo77
— x0rz (@x0rz) September 10, 2018
Fortunately, last week’s release of Tor browser 8.0 is not subject to the security bypass vulnerability, so getting rid of the flaw is as simple as grabbing the latest version of the software.
Unfortunately, that likely was not the case for much of the time this vulnerability was known of, and sold by the bug-hunting biz.
Zerodium, who counts government organizations among the subscribers to the research feed where it discloses purchased bugs, has reportedly made word of the flaw known for “months” prior to Monday’s disclosure. This means that some government organizations could potentially have had the ability to get code onto a fully-patched version of the Tor browser for weeks now.
The company did not respond to a Register request for comment on the matter. ®
Antidetect browser mobile.