Content spoofing on
Low
Vulnerability Details
Scenerio
An attacker can include any arbitrary text using specially crafted tor project url.
Reporting this but not sure if this is in scope (text injection not marked in exclusion list)
Kindly mark it as informative in case if it is out of scope.
Steps
1) Attacker distributed the below url by means of spamming or through his website
Go To-
https://www.torproject.org/index%20not%20found%20at%20this%20server!%20Server%20is%20currently%20on%20maintanance.%20______________________________________________________________________________________________________________________________________________________________________________________________________________%20______________________________________________________________________________________________________________________________________________________________________________________________________________%20Please%20visit%20at.HTTP:/EVIL.ATTACKER.COM%20for%20latest%20updates.%20______________________________________________________________________________________________________________________________________________________________________________________________________________%20______________________________________________________________________________________________________________________________________________________________________________________________________________%20Changes%20are%20in%20progress
2) Since the text came from official site so user believes and gets into attacker trap.
Best Regards
Aryan.
Actions
View on HackerOneReport Stats
- Report ID: 273819
- State: Closed
- Substate: informative
- Upvotes: 4