Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
Trac
Trac
  • Project overview
    • Project overview
    • Details
    • Activity
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Operations
    • Operations
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar

GitLab is used only for code review, issue tracking and project management. Canonical locations for source code are still https://gitweb.torproject.org/ https://git.torproject.org/ and git-rw.torproject.org.

  • Legacy
  • TracTrac
  • Issues
  • #9308

Closed
Open
Opened Jul 22, 2013 by cypherpunks@cypherpunks

JavaScript's BrowserFeedWriter() and other exceptions leak installation paths on OS X and Windows

In #5922 (closed) it was claimed that the vulnerability uncovered at Defcon 17 by Gregory Fleischer (http://pseudo-flaw.net/tor/torbutton/browserfeedwriter-error.html) doesn't affect TBB on OS X. I have just replicated this bug on 2.3.25-10.

When the TBB is installed in a user's homedir, calling (new BrowserFeedWriter()).close() will leak their username in a JS exception.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
None
Milestone
None
Assign milestone
Time tracking
None
Due date
None
Reference: legacy/trac#9308