Insufficiently Protected Credentials Affecting brave/brave-browser package, versions [1.1,1.18.36)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficiently Protected Credentials vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-BRAVEBRAVEBROWSER-2364177
  • published26 Jan 2022
  • disclosed9 Nov 2020
  • creditUnknown

Introduced: 9 Nov 2020

CVE-2020-8276  (opens in a new tab)
CWE-312  (opens in a new tab)

How to fix?

Upgrade brave/brave-browser to version 1.18.36 or higher.

Overview

Affected versions of this package are vulnerable to Insufficiently Protected Credentials. The implementation of Brave Desktop's privacy-preserving analytics system (P3A) between 1.1 and 1.18.35 logged the timestamp of when the user last opened an incognito window, including Tor windows. The intended behavior was to log the timestamp for incognito windows excluding Tor windows. Note that if a user has P3A enabled, the timestamp is not sent to Brave's server, but rather a value from:Used in last 24hUsed in last week but not 24hUsed in last 28 days but not weekEver used but not in last 28 daysNever usedThe privacy risk is low because a local attacker with disk access cannot tell if the timestamp corresponds to a Tor window or a non-Tor incognito window.

References

CVSS Base Scores

version 3.1