Closed
Bug 1680213
Opened 3 years ago
Closed 3 years ago
public IP exposed upon viewing source of a website when using VPN add on
Categories
(WebExtensions :: Request Handling, defect)
Tracking
(Not tracked)
RESOLVED
DUPLICATE
of bug 1657916
People
(Reporter: povilas.juodzevicius, Unassigned)
Details
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.198 Safari/537.36
Steps to reproduce:
- Start the NordVPN (v2.21.0, OS X Catalina, 64 bit) add on
- Select any country to connect to
- Visit https://dnsleaktest.com/ (or any other IP-showing website)
- Click view source
- Find the original user location and IP address in the source code
Actual results:
The original user IP and location are shown in the view-source:// tab.
Expected results:
The masked user IP and location should be shown in the view-source:// tab.
Comment 1•3 years ago
|
||
Shane, is this a dupe of bug 1657916?
Component: Untriaged → Request Handling
Flags: needinfo?(mixedpuppy)
Product: Firefox → WebExtensions
Comment 2•3 years ago
|
||
Yes and it is fixed in 84.
Status: UNCONFIRMED → RESOLVED
Closed: 3 years ago
Flags: needinfo?(mixedpuppy)
Resolution: --- → DUPLICATE
Updated•11 months ago
|
Group: firefox-core-security
You need to log in
before you can comment on or make changes to this bug.
Description
•