Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-46702 PoC — Tor Browser 安全漏洞

Source
Associated Vulnerability
Title:Tor Browser 安全漏洞 (CVE-2021-46702)
Description:Tor Browser是一款用于匿名访问互联网的浏览器。 Tor Browser 存在安全漏洞,该漏洞可以让本地攻击者可利用该漏洞绕过预期的匿名特性,并获得有关本地用户访问的洋葱服务的信息。这可以通过在本地用户使用产品几个小时后分析RAM内存来完成。这是因为产品没有正确释放内存。
Description
Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
Readme
# CVE-2021-46702
# Description:
Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
# Tested Version:
Tor Browser - 9.0.7
# Vendor of Product
https://www.torproject.org/
# Attack Type
Local 
# Impact
Information Disclosure
# Reference 
https://www.sciencedirect.com/science/article/pii/S0167404821001358
# POC Requirements
For the PoC.sh to work, a memory dump of the user work station should be granted. It will provide information about visited sites even after 10 hours from the user interaction.  
You can find the shell script that automate the process of finding the visited onion services in the files section. The following Figure shows the Report file output which indicates the visited sites and additional information:

<img width="826" alt="Screenshot 2022-02-26 at 17 40 35" src="https://user-images.githubusercontent.com/38157380/155847153-38f17ca3-92b2-47fb-bcf3-f7ee47c28d0a.png">


# Discoverer
Malak Alfosail
# Twitter: @malakalfosail
File Snapshot

[4.0K] /data/pocs/6bed1fabf1b7005fe994971f91322cb1358db068 ├── [1.8K] PoC.sh └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.