First published: Tue Feb 23 2021(Updated: )
Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS provider. (DNS requests that were not initiated by CNAME adblocking would go through Tor as expected.) This is fixed in Brave version 1.20.108
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Brave Browser | >=1.17.73<=1.20.103 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21323 is a vulnerability in Brave web browser versions 1.17.73-1.20.103 that allows DNS requests to bypass the Brave Tor proxy.
The CVE-2021-21323 vulnerability in Brave web browser versions 1.17.73-1.20.103 allows DNS requests to bypass the Brave Tor proxy if adblocking is enabled.
The severity of CVE-2021-21323 is medium with a CVSS score of 5.3.
To fix the CVE-2021-21323 vulnerability, update Brave web browser to a version higher than 1.20.103.
The Common Weakness Enumeration (CWE) ID for CVE-2021-21323 is 200.