Content spoofing on

Disclosed: 2023-11-28 08:59:16 By nonamehiiden To torproject
Low
Vulnerability Details
Scenerio An attacker can include any arbitrary text using specially crafted tor project url. Reporting this but not sure if this is in scope (text injection not marked in exclusion list) Kindly mark it as informative in case if it is out of scope. Steps 1) Attacker distributed the below url by means of spamming or through his website Go To- https://www.torproject.org/index%20not%20found%20at%20this%20server!%20Server%20is%20currently%20on%20maintanance.%20______________________________________________________________________________________________________________________________________________________________________________________________________________%20______________________________________________________________________________________________________________________________________________________________________________________________________________%20Please%20visit%20at.HTTP:/EVIL.ATTACKER.COM%20for%20latest%20updates.%20______________________________________________________________________________________________________________________________________________________________________________________________________________%20______________________________________________________________________________________________________________________________________________________________________________________________________________%20Changes%20are%20in%20progress 2) Since the text came from official site so user believes and gets into attacker trap. Best Regards Aryan.
Actions
View on HackerOne
Report Stats
  • Report ID: 273819
  • State: Closed
  • Substate: informative
  • Upvotes: 4
Share this report