CVE-2018-16983
📋 TL;DR
This vulnerability allows attackers to bypass NoScript Classic's script blocking feature by using a malformed Content-Type header value of 'text/html;/json'. This affects users of NoScript Classic before version 5.1.8.7, including those using Tor Browser 7.x and other products that incorporate this extension.
💻 Affected Systems
- NoScript Classic
- Tor Browser
📦 What is this software?
Noscript by Noscript
Tor Browser by Torproject
⚠️ Risk & Real-World Impact
Worst Case
Attackers could execute arbitrary JavaScript on protected websites, potentially leading to session hijacking, credential theft, or malware delivery to users who rely on NoScript for security.
Likely Case
Targeted attacks against Tor Browser users to bypass anonymity protections and execute malicious scripts that would normally be blocked.
If Mitigated
If NoScript is not installed or if users have disabled script blocking for all sites, the impact is minimal as there's no protection to bypass.
🎯 Exploit Status
Exploit was publicly disclosed on Twitter by Zerodium, making weaponization confirmed. Attack requires user to visit a malicious website.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.1.8.7
Vendor Advisory: https://noscript.net/getit#classic
Restart Required: Yes
Instructions:
1. Open NoScript Classic extension settings. 2. Check for updates. 3. Update to version 5.1.8.7 or later. 4. Restart browser.
🔧 Temporary Workarounds
Disable NoScript Classic
allTemporarily disable the NoScript Classic extension until patched
Browser-specific: Navigate to extensions/add-ons manager and disable NoScript Classic
Switch to NoScript Quantum
allMigrate to NoScript Quantum version which is not affected
Uninstall NoScript Classic, install NoScript Quantum from official add-on store
🧯 If You Can't Patch
- Disable JavaScript globally in browser settings (breaks many websites)
- Use alternative script-blocking extensions that are not vulnerable
🔍 How to Verify
Check if Vulnerable:
Check NoScript Classic version in browser extensions/add-ons manager. If version is below 5.1.8.7, you are vulnerable.
Check Version:
Browser-specific: Navigate to about:addons (Firefox) or chrome://extensions (Chrome-based) and check NoScript version
Verify Fix Applied:
Verify NoScript Classic version is 5.1.8.7 or higher in extensions manager.
📡 Detection & Monitoring
Log Indicators:
- Unusual script execution on websites where NoScript should be blocking
- HTTP responses with 'text/html;/json' Content-Type headers
Network Indicators:
- HTTP traffic containing 'Content-Type: text/html;/json' headers
- Requests to known malicious domains that may be exploiting this vulnerability
SIEM Query:
http.content_type="text/html;/json" OR http.user_agent contains "Tor Browser" AND event.action="script_execution"
🔗 References
- https://noscript.net/getit#classic
- https://twitter.com/Zerodium/status/1039127214602641409
- https://www.zdnet.com/article/exploit-vendor-drops-tor-browser-zero-day-on-twitter/
- https://noscript.net/getit#classic
- https://twitter.com/Zerodium/status/1039127214602641409
- https://www.zdnet.com/article/exploit-vendor-drops-tor-browser-zero-day-on-twitter/