[tor-bugs] #20679 [- Select a component]: Tor Bowser Address Spoofing.

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Nov 16 04:15:38 UTC 2016


#20679: Tor Bowser Address Spoofing.
--------------------------------------+-------------------------
     Reporter:  Dhiraj_Mishra         |      Owner:
         Type:  defect                |     Status:  new
     Priority:  Medium                |  Milestone:
    Component:  - Select a component  |    Version:
     Severity:  Major                 |   Keywords:  Tor Browser
Actual Points:                        |  Parent ID:
       Points:                        |   Reviewer:
      Sponsor:                        |
--------------------------------------+-------------------------
 Steps to reproduce the problem:
 Please find the attachment.

 1. Open http://hackies.in/spoof.html
 2. Hit Go.
 3. The Address Bar gets spoofed.

 Address Spoofing:
     Address bar says facebook.com
     Content is not facebook.com

 However by closing the spoofed tab the browser crashed.
 In my attempts to repro, the page always goes blank after a short delay,
 both on Linux and Windows.  I'm sure that it's possible to tweak the
 parameters to DoS the browser and delay the blank paint, but that's
 fragile and is unlikely to work well across machines.

 The timer setTimeout() is actually set to 4 seconds. Locally, the spoofed
 content gets displayed for the time mention in the code (Time value van be
 extended) to make the spoof page stable.

 Demo URL : http://hackies.in/spoof.html
 Please find the attachment for the reference.

 Thank you

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20679>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list