CVE-2021-39246Log File Information Exposure in TOR Browser

Severity
6.1MEDIUMNVD
EPSS
0.1%
top 70.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 24
Latest updateMay 24

Description

Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 0.9 | Impact: 5.2

Affected Packages1 packages

Patches

🔴Vulnerability Details

1
GHSA
GHSA-mqmf-5457-4f39: Tor Browser through 102022-05-24

💬Community

1
HackerOne
Tor Browser using --log or --verbose logs the exact connection time a client connects to any v2 domains.2021-09-27