CVE-2017-16541

MEDIUM

Tor Browser < 7.0.9 - Unauthenticated IP Address Exposure via file:// URL Handling

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2017-16541. PoCs published by Ethan-Chen-uwo.

AI-analyzed exploit summary This repository contains only a README file with no exploit code or technical details. It appears to be a placeholder or incomplete writeup for CVE-2017-16541.

Description

Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.

Exploits (1)

nomisec WRITEUP
by Ethan-Chen-uwo · poc
https://github.com/Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541

This repository contains only a README file with no exploit code or technical details. It appears to be a placeholder or incomplete writeup for CVE-2017-16541.

Classification
Writeup 90%
Attack Type
Other
Complexity
Trivial
Reliability
Theoretical
Target: unknown
No auth needed
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (15)

Core 15
Core References
Issue Tracking, Vendor Advisory x_refsource_misc
https://trac.torproject.org/projects/tor/ticket/24052
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201810-01
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2693
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201811-13
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2018/dsa-4327
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:3403
Issue Tracking, Vendor Advisory x_refsource_misc
https://blog.torproject.org/tor-browser-709-released
Broken Link vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1041610
Broken Link vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/101665
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2692
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:3458
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.mozilla.org/show_bug.cgi?id=1412081

Scores

CVSS v3 6.5
EPSS 0.0769
EPSS Percentile 92.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Details

CWE
CWE-200
Status published
Products (16)
debian/debian_linux 8.0
debian/debian_linux 9.0
redhat/enterprise_linux_desktop 6.0
redhat/enterprise_linux_desktop 7.0
redhat/enterprise_linux_eus 7.5
redhat/enterprise_linux_eus 7.6
redhat/enterprise_linux_eus 7.7
redhat/enterprise_linux_server 6.0
redhat/enterprise_linux_server 7.0
redhat/enterprise_linux_server_aus 7.6
... and 6 more
Published Nov 04, 2017
Tracked Since Feb 18, 2026