Vulnerabilites related to brave - brave-browser
CVE-2021-21323 (GCVE-0-2021-21323)
Vulnerability from cvelistv5
Published
2021-02-23 22:45
Modified
2024-08-03 18:09
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS provider. (DNS requests that were not initiated by CNAME adblocking would go through Tor as expected.) This is fixed in Brave version 1.20.108
Impacted products
Vendor Product Version
brave brave-browser Version: >= 1.17.73, < 1.20.108
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:09:15.370Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/brave/brave-browser/security/advisories/GHSA-mqjf-9x5g-2rv6"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/brave/brave-browser/issues/13527"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/brave/brave-core/pull/7769"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/brave/brave-core/commit/12fe321eaad8acc1cbd1d70b4128f687777bcf15"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://hackerone.com/reports/1077022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "brave-browser",
          "vendor": "brave",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 1.17.73, \u003c 1.20.108"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS provider. (DNS requests that were not initiated by CNAME adblocking would go through Tor as expected.) This is fixed in Brave version 1.20.108"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-23T22:45:19",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/brave/brave-browser/security/advisories/GHSA-mqjf-9x5g-2rv6"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/brave/brave-browser/issues/13527"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/brave/brave-core/pull/7769"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/brave/brave-core/commit/12fe321eaad8acc1cbd1d70b4128f687777bcf15"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://hackerone.com/reports/1077022"
        }
      ],
      "source": {
        "advisory": "GHSA-mqjf-9x5g-2rv6",
        "discovery": "UNKNOWN"
      },
      "title": "Regression in DNS leakage from Tor windows",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2021-21323",
          "STATE": "PUBLIC",
          "TITLE": "Regression in DNS leakage from Tor windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "brave-browser",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "\u003e= 1.17.73, \u003c 1.20.108"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "brave"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS provider. (DNS requests that were not initiated by CNAME adblocking would go through Tor as expected.) This is fixed in Brave version 1.20.108"
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/brave/brave-browser/security/advisories/GHSA-mqjf-9x5g-2rv6",
              "refsource": "CONFIRM",
              "url": "https://github.com/brave/brave-browser/security/advisories/GHSA-mqjf-9x5g-2rv6"
            },
            {
              "name": "https://github.com/brave/brave-browser/issues/13527",
              "refsource": "MISC",
              "url": "https://github.com/brave/brave-browser/issues/13527"
            },
            {
              "name": "https://github.com/brave/brave-core/pull/7769",
              "refsource": "MISC",
              "url": "https://github.com/brave/brave-core/pull/7769"
            },
            {
              "name": "https://github.com/brave/brave-core/commit/12fe321eaad8acc1cbd1d70b4128f687777bcf15",
              "refsource": "MISC",
              "url": "https://github.com/brave/brave-core/commit/12fe321eaad8acc1cbd1d70b4128f687777bcf15"
            },
            {
              "name": "https://hackerone.com/reports/1077022",
              "refsource": "MISC",
              "url": "https://hackerone.com/reports/1077022"
            }
          ]
        },
        "source": {
          "advisory": "GHSA-mqjf-9x5g-2rv6",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2021-21323",
    "datePublished": "2021-02-23T22:45:19",
    "dateReserved": "2020-12-22T00:00:00",
    "dateUpdated": "2024-08-03T18:09:15.370Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}