Tor Browser before 8.0.1 has an information exposure vulnerability. It allows remote attackers to detect the browser's UI locale by measuring a button width, even if the user has a "Don't send my language" setting.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://trac.torproject.org/projects/tor/ticket/24056 | vendor advisory |
https://hackerone.com/reports/282748 | third party advisory issue tracking |
https://gitweb.torproject.org/tor-browser.git/commit/?id=cbb04b72c68272c2de42f157d40cd7d29a6b7b55 | patch mailing list third party advisory |
http://www.securityfocus.com/bid/108484 | broken link third party advisory vdb entry |