vendor:
Tor Browser
by:
t4rkd3vilz
7.5
CVSS
HIGH
Use After Free
416
CWE
Product Name: Tor Browser
Affected Version From: Tor 0.3.2.x
Affected Version To: Tor 0.3.2.10
Patch Exists: YES
Related CWE: CVE-2018-0491
CPE: a:torproject:tor_browser
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=57606, https://www.infosecmatter.com/nessus-plugin-library/?id=45378, https://www.infosecmatter.com/nessus-plugin-library/?id=56480, https://www.infosecmatter.com/nessus-plugin-library/?id=70881, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?id=17158, https://www.infosecmatter.com/nessus-plugin-library/?id=81867
Platforms Tested: Kali Linux
2018
Tor Browser – Use After Free (PoC)
This exploit is a proof of concept for a use after free vulnerability in Tor Browser. The exploit is triggered by creating a frameset element, appending a child element to it, and then adding a DOMAttrModified event listener to the frameset. This causes a use after free vulnerability, which can be used to cause a denial of service.
Mitigation:
Users should upgrade to the latest version of Tor Browser (0.3.2.10) to mitigate this vulnerability.