Lucene search

K
hackeroneRyotakH1:681617
HistoryAug 25, 2019 - 12:34 p.m.

Brave Software: Stored XSS in localhost:* via integrated torrent downloader

2019-08-2512:34:31
ryotak
hackerone.com
75

0.001 Low

EPSS

Percentile

35.9%

Summary:

Due to filename of downloading torrent file isn’t sanitized, an attacker is able to execute arbitrary JavaScript on localhost:* by abusing crafted torrent file.

Products affected:

  • Brave 0.68.131 Chromium: 76.0.3809.100 (Official Build)

Steps To Reproduce:

  1. Open https://exec.ga/browser/brave/xss.torrent in Brave Browser.
  2. Click “Start Torrent” button
  3. Copy link address of “Save File” button.
  4. Paste it to URL bar with only hostname and port (e.g. http://localhost:8080).
  5. Alert will be popped up.

Note: Since it can be embedded with iframe (and it’s possible to brute force port number), Steps after 2 won’t be needed in real attack.

Video PoC

{F565161}

Impact

Attacker will be able to store arbitrary JavaScript on localhost:* with service worker, so if victim run any software on same port after attack, any information in the website that on same port can be stolen.

0.001 Low

EPSS

Percentile

35.9%