CVE-2017-18016

Parity Browser 1.6.10 and earlier allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).
References
Link Resource
https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-18016 Exploit Technical Description Third Party Advisory
https://github.com/paritytech/parity/commit/53609f703e2f1af76441344ac3b72811c726a215 Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2018/01/10/1 Exploit Mailing List Third Party Advisory
https://www.exploit-db.com/exploits/43499/ Exploit Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:parity:browser:1.6.10:*:*:*:*:*:*:*

Information

Published : 2018-01-11 08:29

Updated : 2019-10-02 17:03


NVD link : CVE-2017-18016

Mitre link : CVE-2017-18016


JSON object : View

CWE
CWE-346

Origin Validation Error

Advertisement

dedicated server usa

Products Affected

parity

  • browser