CVE-2020-8276

The implementation of Brave Desktop's privacy-preserving analytics system (P3A) between 1.1 and 1.18.35 logged the timestamp of when the user last opened an incognito window, including Tor windows. The intended behavior was to log the timestamp for incognito windows excluding Tor windows. Note that if a user has P3A enabled, the timestamp is not sent to Brave's server, but rather a value from:Used in last 24hUsed in last week but not 24hUsed in last 28 days but not weekEver used but not in last 28 daysNever usedThe privacy risk is low because a local attacker with disk access cannot tell if the timestamp corresponds to a Tor window or a non-Tor incognito window.
References
Link Resource
https://hackerone.com/reports/1024668 Exploit Issue Tracking Third Party Advisory
https://hackerone.com/reports/1024668 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:38

Type Values Removed Values Added
References () https://hackerone.com/reports/1024668 - Exploit, Issue Tracking, Third Party Advisory () https://hackerone.com/reports/1024668 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2020-11-09 15:15

Updated : 2024-11-21 05:38


NVD link : CVE-2020-8276

Mitre link : CVE-2020-8276

CVE.ORG link : CVE-2020-8276


JSON object : View

Products Affected

brave

  • brave
CWE
CWE-312

Cleartext Storage of Sensitive Information