It is possible for the client IP to leak from the browser and onto the network via the Windows API when prompted with Windows dialog box to select files.
Not entirely sure if this is a bug, but should at least be documented.
Steps to reproduce:
Visit a website that provides an upload box.
Instead of selecting a file, paste a URI as a file name.
The IP is leaked.
This may potentially work with Ctrl+O (Open File) and Ctrl+S (Save Page As).
Tested on Windows 7 and verified with Wireshark.
Trac: Username: uileak
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
Gnome Open File dialog used in Ubuntu doesn't support this feature, however, the File Open dialog used in KDE is able to open HTTP URLs. I'm not sure what is the situation with support in other other desktop environments that run on Ubuntu.
Just tested this in KDE - indeed, it works in KDE just fine. Nice, I didn't know about this feature.
Thus API involved leaks could be fixed in general by setting proxy per process at start.
This approach if alone still leaves disk traces (it writes some information to IE's cache). Fix shouldn't leave any leaks. Proxy option could be helpful still for some unknown yet API-involved leaks, as proactive protection (tbb-disk-leak < tbb-proxy-bypass)