Bypassing Homograph Attack Using /@ [ Tested On Windows ]
Low
Vulnerability Details
## Summary:
__Bypassing Homograph Attack Using /@__
I look at on my previous report on #268984 and see patch code in the github https://github.com/brave/browser-laptop/commit/f2e438d6158fbc62e2641458b6002a72d223c366 I look at code at
```
it('returns the punycode URL when given a valid URL', function () {
assert.equal(urlUtil.getPunycodeUrl('http://brave:brave@ebаy.com:1234/brave#brave'), 'http://brave:[email protected]:1234/brave#brave')
})
```
And i think the punycode will return to ASCII just after `@` before it is not checked. And i give the try. and got some homograph attack. ( Correct Me If I Wrong )
## Products affected:
* Brave 0.20.27 ( Windows )
## Steps To Reproduce:
This is punycode URL ebаy.com@ebаy.com = [email protected]
Add to homepage.
```
Attempt :
- ebаy.com@ebаy.com it'll become = ebа[email protected]
- ebаy.com/ebаy.com it'll become = xn--eby-7cd.xn--com/eby-7fg.com
- ebаy.com/@ebay.com it'll become = ebаy.com/@xn--eby-7cd.com
```
if user input `ebаy.com/@brave.com` user will be redirect to `xn--eby-7cd.com`
punycode failed return to ascii because brave just check after `@` not all of URL
## Supporting Material/References:
Video : https://youtu.be/Zz7KV_R0Wp8
SS :
{F265262}
Thanks
## Impact
User will be tricked by attacker to visit malicious link with punycode inside it.
Actions
View on HackerOneReport Stats
- Report ID: 317931
- State: Closed
- Substate: resolved
- Upvotes: 15