Parity Browser 1.6.10 and earlier allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).
References
Link | Resource |
---|---|
https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-18016 | Exploit Technical Description Third Party Advisory |
https://github.com/paritytech/parity/commit/53609f703e2f1af76441344ac3b72811c726a215 | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2018/01/10/1 | Exploit Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/43499/ | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-01-11 08:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-18016
Mitre link : CVE-2017-18016
JSON object : View
CWE
CWE-346
Origin Validation Error
Products Affected
parity
- browser