The implementation of Brave Desktop's privacy-preserving analytics system (P3A) between 1.1 and 1.18.35 logged the timestamp of when the user last opened an incognito window, including Tor windows. The intended behavior was to log the timestamp for incognito windows excluding Tor windows. Note that if a user has P3A enabled, the timestamp is not sent to Brave's server, but rather a value from:Used in last 24hUsed in last week but not 24hUsed in last 28 days but not weekEver used but not in last 28 daysNever usedThe privacy risk is low because a local attacker with disk access cannot tell if the timestamp corresponds to a Tor window or a non-Tor incognito window.
References
Link | Resource |
---|---|
https://hackerone.com/reports/1024668 | Exploit Issue Tracking Third Party Advisory |
https://hackerone.com/reports/1024668 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackerone.com/reports/1024668 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2020-11-09 15:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8276
Mitre link : CVE-2020-8276
CVE.ORG link : CVE-2020-8276
JSON object : View
Products Affected
brave
- brave
CWE
CWE-312
Cleartext Storage of Sensitive Information