First published: Mon Dec 27 2021(Updated: )
In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled, additional DNS requests are issued outside of the proxying extension using the system's DNS settings, resulting in information disclosure. NOTE: this issue exists because of an incomplete fix for CVE-2021-21323 and CVE-2021-22916.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Brave Browser | >=1.17.1<=1.33.106 | |
Any of | ||
macOS | ||
Linux Kernel | ||
Microsoft Windows Operating System | ||
Brave Browser | >=1.17.1<=1.33.106 | |
macOS | ||
Linux Kernel | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45884 is a vulnerability in Brave Desktop versions 1.17 through 1.33 before 1.33.106 that allows DNS requests to be issued outside of a proxying extension, leading to information disclosure.
The severity of CVE-2021-45884 is high with a severity value of 7.5.
CVE-2021-45884 affects Brave Desktop versions 1.17 through 1.33 before 1.33.106 when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled.
To fix CVE-2021-45884, update Brave Desktop to version 1.33.106 or later.
Yes, you can find references for CVE-2021-45884 in the following links: [GitHub Issue 19070](https://github.com/brave/brave-browser/issues/19070), [GitHub Issue 20079](https://github.com/brave/brave-browser/issues/20079), [GitHub Pull Request 10742](https://github.com/brave/brave-core/pull/10742).