Parity Browser 1.6.10 and earlier allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-18016 | exploit third party advisory technical description |
http://www.openwall.com/lists/oss-security/2018/01/10/1 | mailing list exploit third party advisory |
https://www.exploit-db.com/exploits/43499/ | exploit vdb entry third party advisory |
https://github.com/paritytech/parity/commit/53609f703e2f1af76441344ac3b72811c726a215 | third party advisory patch |