First published: Sat May 07 2022(Updated: )
Brave before 1.34, when a Private Window with Tor Connectivity is used, leaks .onion URLs in Referer and Origin headers. NOTE: although this was fixed by Brave, the Brave documentation still advises "Note that Private Windows with Tor Connectivity in Brave are just regular private windows that use Tor as a proxy. Brave does NOT implement most of the privacy protections from Tor Browser."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Brave Browser | <1.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-30334.
The severity of CVE-2022-30334 is medium with a CVSS score of 5.3.
Brave versions up to and exclusive of 1.34 are affected by CVE-2022-30334.
The vulnerability can be fixed by updating Brave to version 1.34 or later.
Yes, you can find more information on CVE-2022-30334 at the following references: [Reference 1](https://github.com/brave/brave-browser/issues/18071), [Reference 2](https://github.com/brave/brave-core/pull/10760), [Reference 3](https://hackerone.com/reports/1337624).