First published: Tue May 28 2019(Updated: )
Tor Browser before 8.0.1 has an information exposure vulnerability. It allows remote attackers to detect the browser's UI locale by measuring a button width, even if the user has a "Don't send my language" setting.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Torproject Tor Browser | <8.0.1 |
https://gitweb.torproject.org/tor-browser.git/commit/?id=cbb04b72c68272c2de42f157d40cd7d29a6b7b55
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-12383.
The affected software is Tor Browser versions up to and excluding 8.0.1.
The severity of CVE-2019-12383 is medium, with a severity value of 4.3.
The vulnerability allows remote attackers to detect the Tor Browser's UI locale by measuring a button width, even if the user has a "Don't send my language" setting.
Yes, there are references related to CVE-2019-12383. You can find them at the following URLs: [http://www.securityfocus.com/bid/108484](http://www.securityfocus.com/bid/108484), [https://gitweb.torproject.org/tor-browser.git/commit/?id=cbb04b72c68272c2de42f157d40cd7d29a6b7b55](https://gitweb.torproject.org/tor-browser.git/commit/?id=cbb04b72c68272c2de42f157d40cd7d29a6b7b55), [https://hackerone.com/reports/282748](https://hackerone.com/reports/282748).