-
Notifications
You must be signed in to change notification settings - Fork 973
[Security] DNS rebinding attack against webtorrent #12616
Comments
This adds the `hostname` opt to allow the server to validate the `Host` header of incoming requests to prevent DNS rebinding attacks. Needed for brave/browser-laptop#12616.
this does affect webtorrent but the impact is relatively low - the attacker can see the torrented files. however this is usually possible for torrents anyway (unless you're using a private tracker) since the attacker can just join the swarm. |
general issue: #12671 |
Still waiting on merge upstream... moving to tentative 0.20.x hotfix 1 milestone |
upstream webtorrent fix has been merged, we need to add an option to webtorrent-remote though: dcposch/webtorrent-remote#9. |
I think the You can see how So, the solution to this should just be to change Brave's |
our webtorrent integration may be vulnerable to the DNS rebinding attack described in transmission/transmission#468. the torrent server uses CORS but it doesn't check the Host header.
impact: remote sites may see what a user is torrenting
The text was updated successfully, but these errors were encountered: